diff options
author | 46halbe <46halbe@berlin.ccc.de> | 2013-09-22 18:25:13 +0000 |
---|---|---|
committer | 46halbe <46halbe@berlin.ccc.de> | 2020-05-23 13:39:30 +0000 |
commit | fb37ce8b748f287e0a0f5cf56471daa7dbe72da6 (patch) | |
tree | e260eea9e2faf4d3e40aea3d937b338f69e61159 /updates | |
parent | b8c64ad742eedf02640cba4de4bc76229c29ce65 (diff) |
committing page revision 2
Diffstat (limited to 'updates')
-rw-r--r-- | updates/2013/ccc-breaks-apple-touchid.en.md | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/updates/2013/ccc-breaks-apple-touchid.en.md b/updates/2013/ccc-breaks-apple-touchid.en.md index 61dfe186..63890204 100644 --- a/updates/2013/ccc-breaks-apple-touchid.en.md +++ b/updates/2013/ccc-breaks-apple-touchid.en.md | |||
@@ -1,8 +1,8 @@ | |||
1 | title: Chaos Computer Club breaks Apple TouchID | 1 | title: Chaos Computer Club breaks Apple TouchID |
2 | date: 2013-09-21 22:04:00 | 2 | date: 2013-09-21 22:04:00 |
3 | updated: 2013-09-22 18:11:56 | 3 | updated: 2013-09-22 18:25:13 |
4 | author: frank | 4 | author: frank |
5 | tags: update, pressemitteilung, biometrie, biometrics, apple, touchid | 5 | tags: update, pressemitteilung, biometrie, biometrics, apple, touchid, fingerprint |
6 | 6 | ||
7 | The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided. | 7 | The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided. |
8 | 8 | ||