Mobile Network
Comparison

Use this comparison site to pick the best and cheapest mobile phone network in the UK

31 December 2013 ~ 6 Comments

Lenovo A850 first look

lenovo a850

Hot off the heels of their wildly-successful A820 and its follow-up, the A830, Lenovo just announced their latest Android smartphone a few months ago. Since then, we’ve been following the news and rumours and checking our mailroom every day for signs of the brand-new A850.

We’ve already given the in-depth review treatment to other the Lenovo A789 and the Lenovo A820, its A-series brethren, and they both scored very highly in our in-house tests.

However, the A850 looked to be really taking things to the next level. The screen size has been bumped up to a humongous 5.5″ diagonal and the new MT6582M chipset boasts a quad-core 1.3Ghz CPU. But we wouldn’t know much about the actual device until we got our hands on it.

Luckily, a mysterious looking parcel from China recently turned up at MNC HQ and we quickly made the following unboxing video of the stunning Lenovo A850. Check it out now for all the details and full specs of this phone:

Stay tuned for much more including a full benchmark test of the phone as well as our official review and, if you’re very lucky, some simple-to-follow ROM installation tutorials…

25 December 2013 ~ 0 Comments

Happy Christmas from Team MNC

We hope Santa brought you exactly what you wanted. If not, check out these amazing tech deals a little elf brought us 🙂

Tags:

23 December 2013 ~ 0 Comments

Apple’s Touch ID hacked

touch id

German hacking collective, the Chaos Computer Club, have announced that they have successfully broken the security on Apple’s highly-fêted Touch ID fingerprint sensor. They used simple, everyday means to demonstrate a straightforward way to circumvent the fingerprint-reading technology on a Heise Security iPhone 5S.

The group of hackers claim that this conclusively demonstrates that fingerprint biometrics are unsuitable as an access control method (as they have been claiming for some time). The news further calls into question Apple’s use of Touch ID and the various claims they are making about how secure it is. The implementation of a fingerprint sensor on the new iPhone 5S has been touted as an advanced technology with both privacy and security benefits. Fingerprints biometrics are also used on some passports.

However, despite the fact that the home button sensor is only 170 microns thick and has a scanning resolution of 500 ppi, it appears to be fairly trivial to bypass with normal household materials. Previous attempts to incorporate fingerprint sensors as access devices have been found to be easily broken. For all the typical bigging up Apple has been engaging in, there’s nothing revolutionary about the Touch ID sensor. The only real meaningful difference between it and earlier incarnations is that it has a higher resolution.

And so, the Chaos Computer Club attempted to put to rest all the bogus speculation surrounding the fingerprint sensor. They have experience in bypassing other finger and sensors, they decided that the first step to try would be to simply produce a fake fingerprint with as high a high resolution as possible.

For their proof of concept hack, they simply photographed the fingerprint at 2400 dpi, digitally cleaned up the image, and then laser printed it at half that resolution onto a transparent sheet using as thick toner as the printer was able to produce. Then, by applying a layer of standard PVA wood glue and then peeling off, the thick toner leaves a tiny invent similar to a fingerprint. If you just peel off the set glue from the plastic sheet, you then have your very own fake fingerprint. The little bit of damp breath applied, it’s now effortless to break into any Apple device supposedly-secured by touch ID.

This is just a quick hack that took a couple of days to produce working results. Later on, the Chaos Computer Club refined and affected their method. Instead of photographing the fingerprints, they use the scanner instead. And they found that using photosensitive PCB produced a cleaner mould than a simple computer printout. They also determined that the end product be improved upon by using a thin coat of graphite grey instead as it is easier to peel off the fake fingerprint before applying the PVA glue. Frank Rieger, spokesperson of the CCC said the following:

We hope that this finally puts to rest the illusions people have about fingerprint biometrics. It is plain stupid to use something that you can’t change and that you leave everywhere every day as a security token. The public should no longer be fooled by the biometrics industry with false security claims. Biometrics is fundamentally a technology designed for oppression and control, not for securing everyday device access.

We can only concur with this sentiment. After all, it is well known that governments and state security agencies scan your fingerprints at way high resolutions that is required to perform this hack will stop not only that, but your fingerprint is permanent and cannot ever be changed. It’s already been claimed by many that the whole Touch ID system is little more than a meaningless gimmick, but this surely puts to rest the notion that it provides meaningful security for your devices.

What you make of this hack? Did you think the security would be broken this quickly? Do you have an Apple device with Touch ID and do you make use of this feature? And what you think would be the best way to secure our mobile devices?