German hacking collective, the Chaos Computer Club, have announced that they have successfully broken the security on Apple’s highly-fêted Touch ID fingerprint sensor. They used simple, everyday means to demonstrate a straightforward way to circumvent the fingerprint-reading technology on a Heise Security iPhone 5S.
The group of hackers claim that this conclusively demonstrates that fingerprint biometrics are unsuitable as an access control method (as they have been claiming for some time). The news further calls into question Apple’s use of Touch ID and the various claims they are making about how secure it is. The implementation of a fingerprint sensor on the new iPhone 5S has been touted as an advanced technology with both privacy and security benefits. Fingerprints biometrics are also used on some passports.
However, despite the fact that the home button sensor is only 170 microns thick and has a scanning resolution of 500 ppi, it appears to be fairly trivial to bypass with normal household materials. Previous attempts to incorporate fingerprint sensors as access devices have been found to be easily broken. For all the typical bigging up Apple has been engaging in, there’s nothing revolutionary about the Touch ID sensor. The only real meaningful difference between it and earlier incarnations is that it has a higher resolution.
And so, the Chaos Computer Club attempted to put to rest all the bogus speculation surrounding the fingerprint sensor. They have experience in bypassing other finger and sensors, they decided that the first step to try would be to simply produce a fake fingerprint with as high a high resolution as possible.
For their proof of concept hack, they simply photographed the fingerprint at 2400 dpi, digitally cleaned up the image, and then laser printed it at half that resolution onto a transparent sheet using as thick toner as the printer was able to produce. Then, by applying a layer of standard PVA wood glue and then peeling off, the thick toner leaves a tiny invent similar to a fingerprint. If you just peel off the set glue from the plastic sheet, you then have your very own fake fingerprint. The little bit of damp breath applied, it’s now effortless to break into any Apple device supposedly-secured by touch ID.
This is just a quick hack that took a couple of days to produce working results. Later on, the Chaos Computer Club refined and affected their method. Instead of photographing the fingerprints, they use the scanner instead. And they found that using photosensitive PCB produced a cleaner mould than a simple computer printout. They also determined that the end product be improved upon by using a thin coat of graphite grey instead as it is easier to peel off the fake fingerprint before applying the PVA glue. Frank Rieger, spokesperson of the CCC said the following:
We hope that this finally puts to rest the illusions people have about fingerprint biometrics. It is plain stupid to use something that you can’t change and that you leave everywhere every day as a security token. The public should no longer be fooled by the biometrics industry with false security claims. Biometrics is fundamentally a technology designed for oppression and control, not for securing everyday device access.
We can only concur with this sentiment. After all, it is well known that governments and state security agencies scan your fingerprints at way high resolutions that is required to perform this hack will stop not only that, but your fingerprint is permanent and cannot ever be changed. It’s already been claimed by many that the whole Touch ID system is little more than a meaningless gimmick, but this surely puts to rest the notion that it provides meaningful security for your devices.
What you make of this hack? Did you think the security would be broken this quickly? Do you have an Apple device with Touch ID and do you make use of this feature? And what you think would be the best way to secure our mobile devices?
Recent Comments