summaryrefslogtreecommitdiff
path: root/updates
diff options
context:
space:
mode:
Diffstat (limited to 'updates')
-rw-r--r--updates/2013/ccc-breaks-apple-touchid.en.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/updates/2013/ccc-breaks-apple-touchid.en.md b/updates/2013/ccc-breaks-apple-touchid.en.md
index dac0a4b8..673b38e1 100644
--- a/updates/2013/ccc-breaks-apple-touchid.en.md
+++ b/updates/2013/ccc-breaks-apple-touchid.en.md
@@ -1,6 +1,6 @@
1title: Chaos Computer Club breaks Apple TouchID 1title: Chaos Computer Club breaks Apple TouchID
2date: 2013-09-21 22:04:00 2date: 2013-09-21 22:04:00
3updated: 2013-09-24 17:36:07 3updated: 2013-09-24 17:36:33
4author: frank 4author: frank
5tags: update, pressemitteilung, biometrie, biometrics, apple, touchid, fingerprint 5tags: update, pressemitteilung, biometrie, biometrics, apple, touchid, fingerprint
6 6
@@ -49,7 +49,7 @@ The process described above proved to be somewhat unreliable as the
49depth of the ridges created by the toner was a little too shallow. 49depth of the ridges created by the toner was a little too shallow.
50Therefore an alternative process based on the same principle was 50Therefore an alternative process based on the same principle was
51utilized and has been demonstrated in an extended video available 51utilized and has been demonstrated in an extended video available
52[here](http://www.heise.de/video/artikel/The-iPhone-5s-Touch-ID-hack-in-detail-1966044.html "Refined TouchID hacking process"). First, 52[here](http://heise.de/-1966044 "Refined TouchID hacking process"). First,
53the residual fingerprint from the phone is either photographed or 53the residual fingerprint from the phone is either photographed or
54scanned with a flatbed scanner at 2400 dpi. Then the image is converted 54scanned with a flatbed scanner at 2400 dpi. Then the image is converted
55to black & white, inverted and mirrored. This image is then printed onto 55to black & white, inverted and mirrored. This image is then printed onto