{"id":12902,"date":"2016-03-09T06:04:01","date_gmt":"2016-03-09T12:04:01","guid":{"rendered":"http:\/\/hcstx.org\/?p=12902"},"modified":"2016-03-09T06:04:01","modified_gmt":"2016-03-09T12:04:01","slug":"fingerprint-spoofing-yeah-theres-an-app-for-that","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/03\/09\/fingerprint-spoofing-yeah-theres-an-app-for-that\/","title":{"rendered":"Fingerprint Spoofing: Yeah there&#8217;s An App for That"},"content":{"rendered":"<h1 class=\"d1-post-title\" style=\"text-align:center;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-12903\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/03\/fingerprint.jpg\" alt=\"fingerprint\" width=\"620\" height=\"284\" \/><\/h1>\n<h1 class=\"d1-post-title\" style=\"text-align:center;\">So That Thumbprint Thing on Your Phone Is Useless\u00a0Now<\/h1>\n<p class=\"d1-byline\" style=\"text-align:center;\"><strong>Researchers found a cheap, easy way to copy your fingerprints a few months after millions of Americans had theirs stolen by hackers.<\/strong><\/p>\n<p>Last year, when the Office of Personnel Management notified 22 million people that their personal information was compromised in a massive data breach, one in four received especially nasty news. For most hack victims, the sensitive personal data that was exposed included Social Security numbers, health and financial records, names of relatives, and past addresses. But 5.6 million people learned that their fingerprints were also\u00a0stolen.<\/p>\n<p>At the time of the announcement, <span class=\"caps\">OPM\u00a0<\/span>downplayed the importance of the stolen fingerprints. \u201cFederal experts believe that, as of now, the ability to misuse fingerprint data is limited,\u201d an <span class=\"caps\">OPM<\/span>statement read. \u201cHowever, this probability could change over time as technology\u00a0evolves.\u201d<\/p>\n<p>That was in September. Now, researchers have developed a cheap and easy way to print out an image of a fingerprint with enough accuracy to fool commercially available fingerprint readers\u2014using just a standard inkjet\u00a0printer.<\/p>\n<p>The method, outlined in\u00a0<a href=\"http:\/\/www.cse.msu.edu\/rgroups\/biometrics\/Publications\/Fingerprint\/CaoJain_HackingMobilePhonesUsing2DPrintedFingerprint_MSU-CSE-16-2.pdf\">a paper<\/a>\u00a0published last month, is certainly not the first one to produce fake fingerprints that are able to fool readers. But where earlier methods required more time and specialized materials, this new method is replicable in just about any home\u00a0office.<\/p>\n<p>To create a working copy of a fingerprint, the study authors\u2014Kai Cao and Anil Jain, both researchers at Michigan State University\u2014started by installing special ink cartridges and paper in a Brother inkjet printer. Both materials came from a Japanese company called AgIC: The ink can conduct electricity when printed on the specialized paper, effectively creating a printed circuit. The researchers scanned a fingerprint in high resolution, mirrored it, and printed it with the retrofitted\u00a0inkjet.<\/p>\n<p>The researchers placed the fake, printed fingerprint on the fingerprint readers of two popular Android phones, a Samsung Galaxy S6 and a Huawei Hornor 7. Both phones were set up to unlock with the owner\u2019s real fingerprint\u2014but the fake version of the same finger fooled them. (Cao told\u00a0<em><a href=\"http:\/\/qz.com\/631697\/a-regular-inkjet-printer-can-spoof-a-fingerprint-and-unlock-a-phone-in-under-15-minutes\/\">Quartz<\/a><\/em>\u00a0that he had mixed results when using an\u00a0iPhone.)<\/p>\n<p><em><strong>The easy fingerprint-spoofing method is particularly worrisome in the context of the <span class=\"caps\">OPM<\/span> breach.<\/strong><\/em> After all, prints aren\u2019t just useful for unlocking smartphones\u2014they can also be used to authorize financial transactions, from small Apple Pay purchases to large bank transfers. And, of course, once a fingerprint has been compromised, there\u2019s no resetting it the way you can change a password\u2014short of a thumb\u00a0transplant.<\/p>\n<p>The simplicity and speed of the new fingerprint-spoofing method makes it easy to copy a lot of fingerprints fast, Cao told me in an email. His method is remarkable because the fake fingerprints are two-dimensional\u2014earlier techniques required raising the ridges of a fake fingerprint with latex or wood\u00a0glue.<\/p>\n<p>Fingerprint-copying enthusiasts following along at home can get started for cheap. Everything you need to create a paper version of your (or someone else\u2019s) fingerprint can be shipped to your door for less than\u00a0$450.<\/p>\n<p>For the millions of <span class=\"caps\">OPM<\/span> hack victims who had their fingerprint data compromised, that\u2019s unhappy news. Until everyday fingerprint readers advance to the point that they can discern between a human hand and a printout, they may want to start unlocking their smartphones the old-fashioned\u00a0way.<\/p>\n<p>Read the Original Article at <strong><a href=\"http:\/\/www.defenseone.com\/technology\/2016\/03\/so-thumbprint-thing-your-phone-useless-now\/126523\/?oref=defenseone_today_nl\">Defense One<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>So That Thumbprint Thing on Your Phone Is Useless\u00a0Now Researchers found a cheap, easy way to copy your fingerprints a few months after millions of Americans had theirs stolen by hackers. Last year, when the Office of Personnel Management notified 22 million people that their personal information was compromised in a massive data breach, one&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2122,13,74,1317,4912,4942,1132,65,3712],"tags":[2779,5313,1598,5314,5315],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/12902"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=12902"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/12902\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=12902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=12902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=12902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}