9 shares

Whenever we talk about system’s security “Biometrics Verification” comes in our mind as the most safest way of securing our systems. Because biometric verification allows user to set him/his biological feature through which they can be uniquely identified.

Those biological features may include iris, retina, voice waves, hand geometry, finger prints, DNA, earlobe geometry, and signatures. Every person has different biological features which can never be similar to any other person. This is the reason people get a sense of security with biometric verification.

But recently, a German researcher Jan Krissler (aka Starbug), a renowned hacker, has proved that biometric verification is no more an authentic weapon for security. He has claimed that he can rupture Apple’s Touch ID, also he can recreate the finger prints of Ursula Von Der Leyen – German’s Defense Minister.

Initially Krissler showed that he could get access to the owner’s fingerprints through the surface of glass or from smartphone’s own screen. But later he proved that he can breach such locks even without any physical access.

With the selfie image of owner, Krissler can decode the smartphone’s PIN code.

At Biometric 2015 conference in London, Krissler and his some peers presented that, from the eye whites of the owner’s selfie they have extorted the reflection of smarphone’s display. And then in order to extract owner’s PIN code, they have used an ultra high resolution image technical procedure.

Along with it, they also elaborated the high resolution camera working and common laser printer usage to identify and recreate the biological feature and thus revealed the extraction of the reflection from selfie of owner’s eye white.

Moreover, Krissler stated that same technique was used by him and his team to extract Angela Markel’s ( German Chancellor) iris information. And they got Chancellor’s iris information through his picture captured at a press conference.

angela-markel

The picture was printed on the contact lenses and thus this technique was used to breach biometric authentication.

Krissler stated that “Everything is Spoofable”, as earlier he stated the procedure of making finger prints dummy in order to breach Apple’s Touch ID sensors. It is done by print scanner to make a mould.

He revealed the technique that he has used to rupture the biometric authentication of German Defense Minister. He described the usage of DSLR to take finger prints with 200ml lens which can be reproduced from a distance.

Krissler argued that the liveness of any picture sometimes is more than enough, “I can spoof any kind of finger print sensor in just two hours”.

He further added that current biometric technology is fragile and it need to be revised, as it is the future of biometric authetication.

Read More: 9 Simple ways to protect your personal computers and online accounts from the crooks


Like it? Share with your friends!

9 shares
Ramsha Khan

Ramsha is a freelance writer, lives in Lahore, Pakistan.

192 Comments

Your email address will not be published.

  1. Pingback: priligy discounts
  2. Pingback: is honey keto
  3. Pingback: soolantra 6 mg
  4. Pingback: stromectol de 6 mg
  5. Pingback: Anonymous
  6. Pingback: Anonymous
  7. Pingback: Anonymous
  8. Pingback: stromectol price
  9. Pingback: best tadalafil
  10. Pingback: ivermectin 0.08%
  11. Pingback: ivermectina dosis
  12. Pingback: research tadalafil
  13. Pingback: what is cialis
  14. Pingback: ivermectin 0.1 uk
  15. Pingback: canada drug cialis
  16. Pingback: tadal
  17. Pingback: stromectol 0.1
  18. Pingback: viagra uk
  19. Pingback: buy cialis online
  20. Pingback: cialis best price
  21. Pingback: ivermectin human
  22. Pingback: cialis dosis
  23. Pingback: ivermectin 200
  24. Pingback: buying ivermectin
  25. Pingback: ivermectin kaufen
  26. Pingback: stromectol uk
  27. Pingback: ivermectin 4000
  28. Pingback: do-posle-psihologa
  29. Pingback: 1newspapers
  30. Pingback: stromectol 0.1
  31. Pingback: A片
  32. Pingback: grandpashabet
  33. Pingback: türk porno seks
  34. Pingback: fuck google
  35. Pingback: madridbet
  36. Pingback: meritking
  37. Pingback: madridbet
  38. Pingback: meritking giriş
  39. Pingback: grandpashabet
  40. Pingback: Grandpashabet
  41. Pingback: meritking
  42. Pingback: meritking
  43. Pingback: izmir escort
  44. Pingback: grandpashabet
  45. Pingback: fuck porn
  46. Pingback: child porn
  47. Pingback: child porn
  48. Pingback: xxlargeseodigi
  49. Pingback: porn
  50. Pingback: child porn
  51. Pingback: porn
  52. Pingback: child porn
  53. Pingback: porn
  54. Pingback: porn
  55. Pingback: ooohd3.ru
  56. Pingback: porn
  57. Pingback: porn
  58. Pingback: sex
  59. Pingback: izmir travesti
  60. Pingback: gaziemir escort
  61. Pingback: fethiye escort
  62. Pingback: eyüpsultan escort
  63. Pingback: etiler escort
  64. Pingback: hd porno izle
  65. Pingback: istanbul travesti
  66. Pingback: porn
  67. Pingback: kralbet
  68. Pingback: yasam ayavefe
  69. Pingback: grandpashabet
  70. Pingback: grandpashabet
  71. Pingback: grandpashabet
  72. Pingback: child porn
  73. Pingback: travesti.site
  74. Pingback: porn
  75. Pingback: child porn
  76. Pingback: porn
  77. Pingback: porn
  78. Pingback: porn
  79. Pingback: porn
  80. Pingback: kralbet twitter
  81. Pingback: vassycalvados.fr
  82. Pingback: vassycalvados.fr
  83. Pingback: lugabet giriş
  84. Pingback: betgross giriş
  85. Pingback: porn
  86. Pingback: child porn
  87. Pingback: child porn
  88. Pingback: jojobet
  89. Pingback: jojobet twitter
  90. Pingback: porn
  91. Pingback: child porn
  92. Pingback: meritking
  93. Pingback: anal porn
  94. Pingback: child porn
  95. Pingback: child porn
  96. Pingback: porn
  97. Pingback: spinco
  98. Pingback: iyibilirdik
  99. Pingback: marsbahis
  100. Pingback: betine giriş
  101. Pingback: bursa travesti
  102. Pingback: porn
  103. Pingback: porn