Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Hostage
Purchase an Apple iphone anonymously. And it’s easy to defeat fingerprint access (Touch ID) which has been known for years and years and is easily done by any hacker with minimal education.

No Hostage. Defeating Apple's fingerprint TouchID system has not been broken by anyone. The guy who claimed he had done so two days after its release on the iPhone 5s using a photocopied fingerprint, was testing with his own fingerprint and pressing the photocopy to the iPhone with the same finger. The iPhone was reading the living finger through the photocopy instead of reading the photocopy as he thought. Easily falsified and proved wrong by using the same photocopy with a different finger. That failed to open the iPhone. Sorry. You loser.

The point of the iPhone and ApplePay is to prevent identity theft in the first place! your idiotic scenario is for use after they've stolen the identity, and HAVE the credit card information to enter in Apple accounts on iTunes, and passbook, and the iPhone, you idiot! You have to have your barn wide open and the horses escaped from the barn for YOUR exploit to work. Of course the crooks can steal you blind if they have all that already.

Oh, and no crook worth his salt is going to destroy a thousand dollar iPhone. They'd sell it to a sucker who didn't know it had been used in fraud. Of course, they'd never go through your contorted scenario in the first place. They'd just clone the card multiple times, and use it until it's blocked. . . without spending a $1,000 to buy an "anonymous" iPhone, an unnecessary expense for them.

The rest is just more of your irrational MAPS anti-Apple ranting.

Swordmaker's and Kathy's proposed diagnosis for the new ICD-10 addenda:

90210 iOS Munchausen's Apple-Plexy Syndrome (MAPS), The overwhelming compulsion to post negative, judgmental, aggressive, and false commentary on any website thread related to Apple products wherever found, including phobic reaction to projected Apple product user euphoria. First and subsequent encounters.

27 posted on 11/02/2014 9:13:33 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 19 | View Replies ]


To: Swordmaker
"Defeating Apple's fingerprint TouchID system has not been broken by anyone."

In light of the recent court ruling, I can see why many would not want it used as a security at all, opting rather for a password.

28 posted on 11/02/2014 9:20:22 AM PST by moehoward
[ Post Reply | Private Reply | To 27 | View Replies ]

To: Swordmaker; ctdonath2

> “No Hostage. Defeating Apple’s fingerprint TouchID system has not been broken by anyone.”

You’re quick to step in it without asking for details and that makes you both look foolish.

Purchase an iphone and there are two choices:

1. Imprint your own fingerprint.
2. Imprint your finger wearing a membrane with a fake fingerprint or one of someone you don’t like.

Because if your goal is to use the iphone as a means of theft, then you want nothing pointing back to you so option 1 above is not an option for the hacker/thief.

Therefore, option 2 is the only option and finger membranes are easy to make or obtain, and they are easier than contact lenses to use.

Again, this security scheme of Apple’s is a farce and springs from arrogance. The scheme is second rate, could be concocted by any second rate engineer, isn’t novel but is pushed by a company looking for a new edge to replace the disappearing one left by Jobs.

Really, you wouldn’t know real security even if it was pointed out to you because real security blends in with ambient backgrounds and contexts.

And I wasn’t kidding when I said that if you were on the inside of real security you would not be heard from again. You would be alive but never seen or heard from.

By the way, fingerprint security has been around since the 1980s by DOD contractors. Lockheed was involved. They scrapped it because it is so easily defeated.

And if you want to see the junkyard of security inventions, get a tour of an MIT lab where they have a history of working hundreds of thousands of proposals. Each scientist is given a time and a budget and if they don’t work it out they toss their work on the scrap heap and move on to something else (they actually put the equipment or blueprints on an electronic media on a shelf in storage).

Other scientists may retrieve from the junk pile and try a different approach but in most cases the tried inventions that failed remain failed. Touch ID is a rehash of a junked invention and it makes Apple look stupid which they are now without Jobs.

But go on with your cheerleading as it draws attention to your inability to learn anything but what you want to hear and see. And you won’t stop cheerleading because you have too much vested in it which makes you ...well, let’s observe FR protocols here.

And I will repeat, and you should listen carefully: The Internet was scrapped by the military and by federal security offices in the 1980s because it was proved to be impossible to secure. Now decades later you have some truly stupid people thinking they can secure it.

You should study and learn from a related thread:

http://www.freerepublic.com/focus/f-news/3222328/posts

Apple’s tryst really is an “attempt to shoehorn an intractable problem into a solution” and I will bet you that some of their bright computer scientists know it but are scared to death to bring it up in front of the Pink Fascist in charge.

I can see that the Touch ID was an afterthought. Someone quickly thought of the stolen phone scenario and the marketeers at Apple decided to patch in a failed tech to cover up the flaw.


36 posted on 11/02/2014 11:11:37 AM PST by Hostage (ARTICLE V)
[ Post Reply | Private Reply | To 27 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson