And fingerprint readers have a long history of vulnerabilities as well. Some are better than others. The simplest ones just check the ridges of a finger; some of those can be fooled with a good photocopy. Others check for pores as well. The better ones verify pulse, or finger temperature. Fooling them with rubber fingers is harder, but often possible. A Japanese researcher had good luck doing this over a decade ago with the gelatin mixture that’s used to make Gummi bears.
Two Takes
View TECHi Stance
If the new iPhone has fingerprint authentication, can it be hacked?
Wired
View all Wired Two Takes by TECHi
Read the original story
Published September 9, 2013
TECHi's Take
Opposing take will be shared soon.
SourceNOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.
Balanced Perspective
TECHi weighs both sides before reaching a conclusion.
TECHi’s editorial take above outlines the reasoning that supports this position.