Search

If the new iPhone has fingerprint authentication, can it be hacked?

Wired

And fingerprint readers have a long history of vulnerabilities as well. Some are better than others. The simplest ones just check the ridges of a finger; some of those can be fooled with a good photocopy. Others check for pores as well. The better ones verify pulse, or finger temperature. Fooling them with rubber fingers is harder, but often possible. A Japanese researcher had good luck doing this over a decade ago with the gelatin mixture that’s used to make Gummi bears.

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Source

0 Comments

Leave a Reply

No comments yet. Be the first to comment!

Leave a Reply

Thanks for choosing to leave a comment. Please keep in mind that all comments are moderated according to our comment policy, and your email address will NOT be published. Please Do NOT use keywords in the name field.

Your email address will not be published. *

Two Takes RSS
Interested in TECHi Feed RSS?

Get the latest insights, tips, and updates on revolutionizing your workspace to your inbox.