• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home Research/How to do it

Fingerprint Authentication Can Be Broken Too. Here’s What This Designer Created To Make It Safer

Paul Balo by Paul Balo
July 31, 2016
in Research/How to do it, Security
Share on FacebookShare on Twitter

Fingerprint technology has been around for a long time and has since been a source of authentication.  With tech companies thinking of phasing out the password because many of us really don’t border following the three month rule in addition to having perpetually weak password. It’s common knowledge now that you should change the password to your online accounts every three month if possible to be safe but you and I know that we don’t especially in light of many such of accounts we have.

From MasterCard to Google, selfies and biometrics are gradually replacing the password. The fingerprint is unique to individuals and difficult to break right? While you may be correct, you should know that these companies store this information like any other data on a secure server somewhere. But if there’s anything the LinkedIn and Twitter breaches have taught us is that any data can be stolen with such information being sold by hackers on the dark web. From the newer iPhone versions to bank verification, fingerprint details are stored somewhere “safe” and as we did learn when hackers broke into the American Office of Personnel Management and stole the records of about 5.6 million people including biometric details, these information especially from public sector workers can be sold to adversaries.

So I googled how to beat fingerprint biometrics and what I discovered that it’s actually much simple to break the fingerprint security. By simply using methods like rubber cement of the kind you probably used in elementary school art class is one of the most reliable ways to make a copy of a finger print. Doing so typically requires “cooperating” or by forcing the print owner though and there are other methods listed there. People can use gelatin which “has many of the same conductive properties as human skin and can fool more sophisticated readers designed to sniff out inorganic “fingers.” Researchers lat Yokohama National University conducted a series of tests designed to fool biometric readers over a decade ago.”

So if this is not as secure, which one is?

Well the essence of the article is not so that the next time you walk into the store and they ask you to authenticate yourself using your biometric details, you become really suspicious even of the friendly attendant. It’s for you to be aware and therefore be careful but as I was researching the subject, I came across an article from MotherBoard which looked at a new concept in which someone replaced their fingerprint with prosthetics his fingerprint details from being used unauthorised persons. I’ll go ahead and paste some parts of their research (BY JOSHUA KOPSTEIN) which can be found be seen by clicking on the link.

“My substitute prints were provided by Mian Wei, a third-year industrial design student at the Rhode Island School of Design. Using his IDENTITY kit, anyone can cover their real fingerprint with a fake one that’s fully-functional, replaceable, and practically impossible to copy.

IDENTITY

Many people believe we are all cyborgs now, connected to the internet 24 hours,” Wei told me when we met recently at a cafe near Harvard Square in Cambridge. “When we set our own piece of skin as the passcode, it is a solid and definite connection. You can [Photoshop] your face now, but you can’t really change your fingerprints, and you [lose] them on everything you touch.”

About IDENTITY

Created for a prosthetics design class, Wei said the goal of his project was to make a biometric privacy product that people might actually use in the real world. IDENTITY’s packaging is designed to look like something you’d find on a shelf at your local drug store, and each fingerprint-spoofing strip is individually wrapped—like bandages in some kind of counter-surveillance first aid kit.

The sticky black prosthetics are made from a mixture of conductive silicone and contain a random mess of fibers, which replace the tiny ridges that sensors normally look for on a real fingerprint. IDENTITY 1Once wrapped around my index finger, I could assign the false fingerprint to unlock my phone just like I would with my actual finger.

Now, even if someone managed to make a mold of my real fingerprint—as a member of the Chaos Computer Club did in 2013 to spoof the iPhone’s TouchID sensor—they still wouldn’t be able to unlock my phone.

Even further, the print created by the false finger when it touches objects isn’t really a “pattern” so much as a bunch of random lines; the fibers that form those lines are simply mixed into the silicone material, then cured and sliced into small strips. That means the prosthetic’s impression would be virtually impossible to recognize as a fingerprint, let alone duplicate, Wei says.

So would anyone in their right mind actually use a replaceable fingerprint? After two weeks of wearing one of Wei’s IDENTITY prosthetics, my general feeling was: probably, under the right circumstances.

The good news is it definitely works. Once I had assigned the fake finger to unlock my phone, the prosthetic was just as dependable as my real finger. (I was using an iPhone 6S and a Nexus 5X, but you’d theoretically get the same results on any device with a fingerprint reader) said Joshua.

From the  MotherBoard report, it’s clear that while this sounds good, there’s really no single absolute solution which is why biometrics are sometimes combined with facial recognition which can be photo shopped as well. As I have always said, when it comes to security, you are the best person to do that because in most breaches, hackers need to get on your device to carry out any actions whether they be software or hardware based. It all begins by clicking on links you shouldn’t be clicking on the web while other times, you carelessly leave your important device in the open.

 

Related Posts:

  • key-visual2
    Google Password-less Sign-in Standard Introduces…
  • twostep
    Google Sign in Will Require 2FA Verification
  • Microsoft_passwordless
    Microsoft Will Roll Out Passkey Support For All Consumers
  • passkey-sync
    Google Begins Rollout Of Passkeys Across Its Services
  • 51025-100802-paypal-passkey-iphone-xl
    PayPal Is Adding More Secure Passkey Logins
  • app icons, social media, search _ logo, google, engine, software_md
    Google Updates Its Built-In Password Manager For…
  • netflixandnope
    Netflix Password Sharing Crackdown Is Working In The…
  • csm_1200x630wa_5026e9630c
    Microsoft Pushes Edge & Disables Authenticator Autofill

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: airtelbiometricscyber securityfingerprinthardwareIDENTITYNFLrubicon projectsecuritysponsorshipsTeams
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Select Category

    Receive top tech news directly in your inbox

    subscription from
    Loading

    Freshly Squeezed

    • DOJ Reportedly Investigates Google’s Character.AI Partnership May 23, 2025
    • Sony Organises A PlayStation Event for June; A State of Play May 23, 2025
    • Microsoft’s New AI features in Notepad, Paint, & Snipping Tool Test Trials May 23, 2025
    • Bluesky Starts Confirming “Notable” Users May 23, 2025
    • Affiniti Raises $17M for AI-Powered Small Business Finance May 22, 2025
    • Absolute Zero’ AI Achieves Top-Level Reasoning Without Human Data May 22, 2025

    Browse Archives

    May 2025
    MTWTFSS
     1234
    567891011
    12131415161718
    19202122232425
    262728293031 
    « Apr    

    Quick Links

    • About TechBooky
    • Advertise Here
    • Contact us
    • Submit Article
    • Privacy Policy

    Recent News

    DOJ Reportedly Investigates Google’s Character.AI Partnership

    DOJ Reportedly Investigates Google’s Character.AI Partnership

    May 23, 2025
    Sony Organises A PlayStation Event for June; A State of Play

    Sony Organises A PlayStation Event for June; A State of Play

    May 23, 2025
    Microsoft’s New AI features in Notepad, Paint, & Snipping Tool Test Trials

    Microsoft’s New AI features in Notepad, Paint, & Snipping Tool Test Trials

    May 23, 2025
    Bluesky Starts Confirming “Notable” Users

    Bluesky Starts Confirming “Notable” Users

    May 23, 2025
    Affiniti Raises $17M for AI-Powered Small Business Finance

    Affiniti Raises $17M for AI-Powered Small Business Finance

    May 22, 2025
    Absolute Zero’ AI Achieves Top-Level Reasoning Without Human Data

    Absolute Zero’ AI Achieves Top-Level Reasoning Without Human Data

    May 22, 2025
    • Login

    © 2021 Design By Tech Booky Elite

    Generic selectors
    Exact matches only
    Search in title
    Search in content
    Post Type Selectors
    • African
    • Artificial Intelligence
    • Gadgets
    • Metaverse
    • Tips
    • About TechBooky
    • Advertise Here
    • Submit Article
    • Contact us

    © 2021 Design By Tech Booky Elite

    Discover more from TechBooky

    Subscribe now to keep reading and get access to the full archive.

    Continue reading

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok