CENTRAL IT SALES SERVICES NEWS PRODUCTS HOSTING SUPPORT CONTACT
item6

Click here to receive our newsletter and special offers delivered direct to your inbox.

item6a1
item3a
item3a

Report a Problem

Check on a Request

Knowledge Books

System Status

Latest News

Repair Extension Programmes

Download Remote Software

item3a
item3a
item6a1b

Blog Archive

Wednesday 25 September 2013

Apple's Touch ID may not be bulletproof, but it's still useful


As you’ve probably heard by now, Apple’s Touch ID—the technology behind the iPhone 5s’s new fingerprint scanner—was circumvented over the weekend by a group of German security researchers. With little more than the kind of supplies you’d find in the home of your average computer enthusiast, the hackers claim to have fooled the sensor on their brand-new handsets into accepting a fake fingerprint that had been photographed at high resolution, printed out, and transferred to a piece of latex.

If true, this trick appears to cast some serious doubts on just how effective Touch ID is at keeping your information secure from ill-intentioned third parties. But despite those concerns, you shouldn’t discount the usefulness of Apple’s fingerprint-based security system just yet.

Being, having, and knowing

The idea behind using fingerprints to unlock your phone is that they tie your data to something that uniquely identifies you in a physical way. Unlike a password, which can be guessed and cracked even if nothing is known about its user, biometric data like fingerprints is generally thought to be impossible to reproduce without having access to the original.
More to the point, fingerprints aren’t supposed to replace your passwords so much as work alongside them. The idea is that even if hackers manage to guess your password, they still won’t have the finger that goes along with it. Ideally, for added security, you’d even want to couple a fingerprint (something you “are”) and a password (something you “know”) with a third item that is in your possession, like an access card or a device capable of receiving SMS messages (something you “own”).

The problem

From this point of view, then, the protection that Touch ID offers starts to look a bit iffy. As many have already pointed out, given how easily the German researchers were able to fool the iPhone’s fingerprint sensor, it would be trivial for a thief who has physical access to your surroundings to take a picture of your prints and use them to unlock your phone. (Incidentally, if you’re worried about leaving usable fingerprints right on your phone itself, one suggestion is registering a seldom-used finger, like your pinkie, to minimize the risk).
The Touch ID sensor is built into the Home button and provides an alternative to entering a passcode.
This scenario, however, has a few flaws for all but a relatively small portion of users. For one thing, even if a would-be thief could unlock your phone with a fake fingerprint, they would also have to get their hands on your iPhone for long enough to siphon all its information out, or, at the very least, for as long as it takes to change your iCloud password so that they could try to gain access to your backups, calendars, and e-mail accounts. This is not as simple as it sounds—at least, as long as the thieves aren’t are known to the phone owner.
In addition, if you are like most of the people I know, your iPhone is never far away from your hands and pockets, and you would likely notice its absence in short order—at which point, if you’re worried about your information, you will run for the nearest computer and use Find My Phone to disable your device, pronto.
Obviously, this doesn’t protect your from, say, a jealous spouse or a determined private investigator; outside of Hollywood fiction, however, those people usually have easier means to gain access to potentially incriminating information—like, say, accessing your home computer after you’ve gone to work or simply calling up your cellular company and talking a customer support into faxing them a copy of your last bill.

Focus on the good, not the bad

In real life, the only people who worry about these kinds of data theft are likely to be too sophisticated and security-conscious to use Touch ID in the first place. And, if they aren’t, their digital lives probably have plenty more vulnerabilities that are easier to exploit than playing arts-and-crafts, Mission: Impossible style.
A German hacking group bypassed the Touch ID sensor by using a fingerprint transferred to latex.
Touch ID was built for the rest of us—people who have fewer skeletons in their closet, but who are still vulnerable to enemies born out of opportunity. According to many statistics, tens of thousands of iPhones are stolen every year across North America. From the thieves’ point of view, snatching a smartphone in the street is easy, low in risk, and potentially very rewarding: you end up with a valuable piece of electronics—and, if the phone isn’t locked, you also get a peek at enough of a person’s information to do some serious damage. (And iOS 7’s Activation Lock can at least make it harder for a thief to wipe and resell your phone.)
Passcodes are a good solution to this problem, but they are also inconvenient—so much so that, according to a recent McAfee survey, less than one third of users actually enable them. Touch ID, on the other hand, is very convenient, and its futuristic appeal makes it fun to use, which means that a large number of users may, for the first time, actually protect their data with some level of security.

Marketing gone awry

Ultimately, Apple’s marketing has done a poor job of explaining Touch ID to the public. Instead of promoting it as an alternative to passcodes, Apple would have probably been better served by selling it as an alternative to, well, nothing, which is what the vast majority of users have chosen as their data protection mechanism of choice.
In practice, Touch ID is safe enough to use for most of us—perhaps not as good as a fifteen-character password, but probably better than a four-digit passcode, and certainly much better than nothing at all.

DON'T-MISS STORIES

item6a2a2

Copyright © Central IT Services Ltd

bannernews
CENTRAL IT SERVICES NEWS PRODUCTS HOSTING SUPPORT item6a2a2