Monday, September 23, 2013

Touch ID is hacked. And what then? - Computerworld

Apple launched its Iphone 5S September 10 and IOS 7 was made available the following day. The big news with 5S was integrated fingerprint reader, called ‘Touch ID’, which should give a much better security than the use of four-digit PIN code according to the advertising.

Since launch, hackers have shown via Youtube how they get access to your photos and videos even your iPhone or iPad with iOS 7 is locked. It was due to a function for the user that could be turned off.

Then hackers have figured out how they can call whoever they want to bypass the security lock screen on an Iphone with IOS 7 The recipe is of course on Youtube.

is expected a security update from Apple to get rid of vulnerability. Thursday, September 19 announced the two men a cash prize to the first one who managed to pick up a fingerprint from a glass and use it to get in on an iPhone 5S. The competition was suddenly “crowdsource” on Twitter. People put a little money in the pot, and suddenly there were some tens of thousands.

Sunday, September 22 announced the German Chaos Computer Club that they have done it. The first video is on Youtube, and a new video will be created to show the whole process from A to Z.

All this for months before before the hold of the phone here in Norway. What does that mean in practice?

Nice little.

With the deployment of Iphone 5s we get the biggest global roll-out of a consumer gadget that offers the use of biometric authentication.

weaknesses of images and telephony solved through software updates. The weaknesses of the physical fingerprint sensor can not resolve as easily. Hackers screaming their wits’ end, and some say that biometrics has no future as a replacement for passwords.

Most people forget to make a reasonable assessment. Most phones that are lost are found by honest souls who wish to return them. Therefore it is important that you have ownership information on the phone, and like the lock screen. Theft of phones because usually someone who will use or resell the unit itself. There is no desire or need to access the information stored there.

In the worst case you are the victim of a targeted attack, the attacker must have some information you have. There are many ways to achieve it, most of which do not involve the use of violence or threats against you as a person.

use of fingerprints in Iphone 5S increases usability by the need to remember and enter a PIN code every time you want to unlock your phone or buy an app attacker must make a complicated piece of work to hold your finger (all fingers) in order to succeed in achieving physical access to the data on your phone. Not least attacker obtain your phone at some point too. There are much easier ways to finish.

I’m not at all worried that security is demonstrably circumvented Apple’s latest product. As a replacement for missing or bad PIN codes, there is no doubt that “Touch ID” is a good, friendly and most importantly, safe enough solution for us consumers in general.

Just be sure not to fall asleep on the couch with the phone on the table beside. Then it becomes a little too easy for kids to buy new apps with your sleeping consent.

No comments:

Post a Comment