Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker; ctdonath2

> “No Hostage. Defeating Apple’s fingerprint TouchID system has not been broken by anyone.”

You’re quick to step in it without asking for details and that makes you both look foolish.

Purchase an iphone and there are two choices:

1. Imprint your own fingerprint.
2. Imprint your finger wearing a membrane with a fake fingerprint or one of someone you don’t like.

Because if your goal is to use the iphone as a means of theft, then you want nothing pointing back to you so option 1 above is not an option for the hacker/thief.

Therefore, option 2 is the only option and finger membranes are easy to make or obtain, and they are easier than contact lenses to use.

Again, this security scheme of Apple’s is a farce and springs from arrogance. The scheme is second rate, could be concocted by any second rate engineer, isn’t novel but is pushed by a company looking for a new edge to replace the disappearing one left by Jobs.

Really, you wouldn’t know real security even if it was pointed out to you because real security blends in with ambient backgrounds and contexts.

And I wasn’t kidding when I said that if you were on the inside of real security you would not be heard from again. You would be alive but never seen or heard from.

By the way, fingerprint security has been around since the 1980s by DOD contractors. Lockheed was involved. They scrapped it because it is so easily defeated.

And if you want to see the junkyard of security inventions, get a tour of an MIT lab where they have a history of working hundreds of thousands of proposals. Each scientist is given a time and a budget and if they don’t work it out they toss their work on the scrap heap and move on to something else (they actually put the equipment or blueprints on an electronic media on a shelf in storage).

Other scientists may retrieve from the junk pile and try a different approach but in most cases the tried inventions that failed remain failed. Touch ID is a rehash of a junked invention and it makes Apple look stupid which they are now without Jobs.

But go on with your cheerleading as it draws attention to your inability to learn anything but what you want to hear and see. And you won’t stop cheerleading because you have too much vested in it which makes you ...well, let’s observe FR protocols here.

And I will repeat, and you should listen carefully: The Internet was scrapped by the military and by federal security offices in the 1980s because it was proved to be impossible to secure. Now decades later you have some truly stupid people thinking they can secure it.

You should study and learn from a related thread:

http://www.freerepublic.com/focus/f-news/3222328/posts

Apple’s tryst really is an “attempt to shoehorn an intractable problem into a solution” and I will bet you that some of their bright computer scientists know it but are scared to death to bring it up in front of the Pink Fascist in charge.

I can see that the Touch ID was an afterthought. Someone quickly thought of the stolen phone scenario and the marketeers at Apple decided to patch in a failed tech to cover up the flaw.


36 posted on 11/02/2014 11:11:37 AM PST by Hostage (ARTICLE V)
[ Post Reply | Private Reply | To 27 | View Replies ]


To: Hostage

1. Let’s see you try it.
2. It’s still a lot harder than copying a 19 digit number.

Let us know when someone breaches Apple Pay.


37 posted on 11/02/2014 12:24:14 PM PST by ctdonath2 (You know what, just do it.)
[ Post Reply | Private Reply | To 36 | View Replies ]

To: Hostage
You’re quick to step in it without asking for details and that makes you both look foolish.

Purchase an iphone and there are two choices:

1. Imprint your own fingerprint.
2. Imprint your finger wearing a membrane with a fake fingerprint or one of someone you don’t like.

Because if your goal is to use the iphone as a means of theft, then you want nothing pointing back to you so option 1 above is not an option for the hacker/thief.

Therefore, option 2 is the only option and finger membranes are easy to make or obtain, and they are easier than contact lenses to use.

The only one looking foolish here is you, Hostage. . . and idiotic. I said the iPhone security could not be broken, I did not say it could not be spoofed. It certainly can but it not "easy to make or obtain, nor easier to use than a contact lens." The only person who has accomplished it has done so using super glue deposition techniques, casting a thin film membrane, picking up the super-glued imprint of the correct fingerprint, and then gluing it on a living finger. . . And even then got a one positive result in six attempts result in unlocking the iPhone with TouchID. He bemoaned that Apple did not lock out TouchID after a certain number of false tries, apparently unaware it now requires a passcode after five failed attempts.

“I don’t see this to be a risk to consumers in any way because I don’t think criminals are sophisticated enough,” Rogers said in an email interview. “It is difficult to make these fingerprints—think of Touch ID as being the equivalent of a door lock. It's there to stop the average criminal from getting access, or in the case of Touch ID, claiming they are you.”

Not only does a potential hacker need a clear print from their target that can be lifted by using super glue fumes and fingerprint powder, they will also have to get access to lab equipment to photograph, print, and then cast the fingerprint using chemicals and smearing it with glue. Unless you have access to a crime laboratory, the equipment is prohibitively expensive. . . .

Even though Rogers is impressed with the technology, he says Apple could do more to keep devices secure. Some improvements, he says, could include limits on the number of unlocking attempts a device will allow, a fallback to a passcode when the device hasn’t been used for a specific amount of time, and “best practices” suggested by Apple which may include using different fingers for different authentication.

—Source: Readwrite.com "Apple's Touch ID Fingerprint Scanner Is Still Hackable, But Don’t Panic This is not an easy attack" September 23, 2014.

So your "easy" claim is shot down completely. Again, your idiotic scenario from before was an after the ID theft exploit, this requires a complex technology scenario to spoof access not available to the average thief. Rogers failed to notice that Apple has already implemented all excet the different finger for different authentication security, which I think would be a good idea.

Could the police use this technique? Yes.

Really, you wouldn’t know real security even if it was pointed out to you because real security blends in with ambient backgrounds and contexts.

That's a bunch of words strung together that means absolutely nothing in this context. Much like all of your anti-Apple posts.

I can see that the Touch ID was an afterthought.. Someone quickly thought of the stolen phone scenario and the marketeers at Apple decided to patch in a failed tech to cover up the flaw.

You cannot see beyond your deranged hatred of anything Apple. As I said, you suffer from MAPS. ApplePay is far better than anything else being offered at this time and the Creditcard companies and banks, who ARE far better versed in such security matters than YOU, Hostage, have vetted it and accepted it as such, and are signing on, putting their money at risk—something they HAVE NOT DONE with Google Wallet. I think I will trust their judgment far better than some anonymous anti-Apple idiot on the Internet who has amply demonstrated his ignorance in the past. You. My brother-in-law was the head of IT Security for MasterCard for many years until his retirement. He thinks Apple has nailed it for point of sales security for consumers. Again, I think he knows one hell of a lot more about what's requ than you do. . . and he is not any kind of Apple user.

39 posted on 11/02/2014 2:14:56 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 36 | View Replies ]

To: Hostage; ctdonath2
You should study and learn from a related thread:

http://www.freerepublic.com/focus/f-news/3222328/posts

Oh, I'm shaking in my boots. . . NOT!

How much of an idiot do you think I am? That FR thread Is about an article on a Chinese hackers' conference on HACKING Android devices, you idiot, the mobile platform which has 97% of mobile malware written for it because of the vulnerabilities in it!!! The rest of mobile malware is on Symbian, Windows Phone, and RIMM. Nowhere in there is there any report on their success in breaking in to Apple devices.

"He said his team has found similar security vulnerabilities in as many as 70 mainstream handsets, including Google’s Nexus 5 and Samsung’s Galaxy S5.. . .

Other hacking demonstrations at the event involved the Mi Wi-Fi rounter developed by Chinese low cost smartphone maker Xiaomi and the 360 Child Guard tracking bracelet from web security company Qihoo 360.

Whoopee duck. . . more Android exploits. I'm especially happy about them hacking Xiaomi. They make Android iPhone 6 knock offs.
41 posted on 11/02/2014 2:50:26 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 36 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson