#科技头条#20130923【德黑客破解5S指纹识别技术，称其不靠谱】柏林黑客组织Chaos Computer Club（宣布，在产品发布2天后就攻破了iPhone 5S指纹阅读器。CCC在网站声明中表示：“有了手机用户的指纹、有了玻璃屏幕的拍照，就可以制作伪指纹，然后通过TouchID解锁。这再次证明指纹生物识别技术不适合成为接入方式，应该避免使用。”http://techcrunch.com/2013/09/22/hackers-bypass-apples-touch-id-with-lifted-fingerprint/
Fingerprint scanners have always been vulnerable to hackers who are willing to go the extra mile to bypass them. Over the years, we’ve seen everything from people using Gummy Bears, Play-Doh and more sophisticated techniques to bypass these biometric scanners. It’s not really a surprise then, that Apple’sTouch ID fingerprint scanner on the new iPhone 5s is vulnerable to these kinds of hacks as well. As Germany’s Chaos Computer Club (CCC) announced today, it has managed tobypass TouchID by creating a fake finger that uses lifted prints to fool the scanner into believing it’s dealing with its rightful owner.
First you need some kind of colored powder or superglue to lift the fingerprint. Then you have to scan the fingerprint, invert it and print it with a resolution of 1200dpi or more onto a transparent sheet. After that, you build your fake finger by smearing pink latex milk or white wood glue into the pattern that the toner created onto the transparent sheet and wait for it to set. Finally, the CCC writes, “the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone.” This method should work for virtually every fingerprint scanner on the market today.
If somebody is willing to go through all of this to break into your phone, chances are you have bigger issues than fingerprint security. Also, given that most iPhone users probably don’t even use a PIN code to secure their devices today, Touch ID still marks a massive step forward in smartphone security — even given the remote chance that somebody would lift your fingerprint and go through the trouble of bypassing it.