TechHive: Apple's Touch ID may not be bulletproof, but it's still useful

TechHive
TechHive helps you find your tech sweet spot. We guide you to products you'll love and show you how to get the most out of them. 
Retargeting on Facebook?

Get more sales and conversions with Facebook retargeting. Try it free for 14 days. Set up takes just minutes!
From our sponsors
thumbnail Apple's Touch ID may not be bulletproof, but it's still useful
Sep 24th 2013, 11:30, by Marco Tabini

As you've probably heard by now, Apple's Touch ID—the technology behind the iPhone 5s's new fingerprint scanner—was circumvented over the weekend by a group of German security researchers. With little more than the kind of supplies you'd find in the home of your average computer enthusiast, the hackers claim to have fooled the sensor on their brand-new handsets into accepting a fake fingerprint that had been photographed at high resolution, printed out, and transferred to a piece of latex.

If true, this trick appears to cast some serious doubts on just how effective Touch ID is at keeping your information secure from ill-intentioned third parties. But despite those concerns, you shouldn't discount the usefulness of Apple's fingerprint-based security system just yet.

Being, having, and knowing

As I mentioned in an article I wrote for Macworld back in August, the idea behind using fingerprints to unlock your phone is that they tie your data to something that uniquely identifies you in a physical way. Unlike a password, which can be guessed and cracked even if nothing is known about its user, biometric data like fingerprints is generally thought to be impossible to reproduce without having access to the original.

More to the point, fingerprints aren't supposed to replace your passwords so much as work alongside them. The idea is that even if hackers manage to guess your password, they still won't have the finger that goes along with it. Ideally, for added security, you'd even want to couple a fingerprint (something you "are") and a password (something you "know") with a third item that is in your possession, like an access card or a device capable of receiving SMS messages (something you "own").

To read this article in full or to leave a comment, please click here

You are receiving this email because you subscribed to this feed at blogtrottr.com.

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Previous
Next Post »