Until apple allow other apps to make use of the scanner it's kind of pointless and totally under utilised at the moment.
I don't get why people get so uptight about NSA. It's there to protect you. If you aren't doing anything wrong then they have no reason to snoop on your data. Simple.
Hmm when it is snowing, raining or just balls cold this winter. Good luck when you have gloves on. Hope you still have the pass code option.
Are you saying that you don't care about every phone call you make being recorded, and every email or text you send is being saved, and every web site you visit is being logged, and everywhere you drive your car it is photographed and stored with the time and location, which is correlated using the GPS in your phone and also in your car? Are you saying you don't care that every purchase you make is logged?
And all this is being done not because you are important, but despite the fact that you are not important.
Dear Apple, I'm sorry I'm moving to Samsung Note 3
Why worry about cracking the phone to get to the fingerprint images or data? Just order the prints/data from NSA. They get it effortless from their dear friends at Apple, who will never admit they work together and to what extend...
![]()
Dear Apple, I'm sorry I'm moving to Samsung Note 3
Are you saying that you don't care about every phone call you make being recorded, and every email or text you send is being saved, and every web site you visit is being logged, and everywhere you drive your car it is photographed and stored with the time and location, which is correlated using the GPS in your phone and also in your car? Are you saying you don't care that every purchase you make is logged?
And all this is being done not because you are important, but despite the fact that you are not important.
We'll see about the faster part. The scanner does not add any security because you will still has the pin. If anything, having two ways to unlock the device creates more options for hacking (compared with he single option).
If device is locked with a fingerprint I wonder the repercussions? Could authorities force you to unlock your device with your finger or successfully use a fingerprint on file in some creative manner?
They are only allowed to search the content of your phone with a search warrant. There have been cases where phones were searched during an arrest, there is now precedence that this is illegal and any evidence found is inadmissible.
If they have a search warrant, the police are allowed to use any technical means to unlock the phone. And you are required to unlock it, unless the fact that you can unlock it is in itself evidence to you (if you claim it isn't your phone for example).
You live obviously in a parallel world, consisting of fear, fear and fear. Thank god, that i live in the real world.
On the contrary, I'm not afraid at all. But considering how apparently easy it is for people to hide amongst the crowd, a few extra measures to root them out is a small asking price. There is a line of course, but I've yet to see the intelligence communities, or the government for that matter, cross it. If they start rounding people up in martial law, then we've got a problem.
Can someone please enlighten me on why people are so fussy about the NSA getting fingerprint data? What can they do with that information? It's not like they can even sell it to marketers.![]()
...do you mean we should TRUST Apple with all our information because they assure our safety and privacy???
-the same way that all our data has been handed over so easily to government without our consent?
-the same way (allegedly) Gov can access data on our iphones??
So now we should trust a phone maker with our biometric data??????
I Love my iphones but if there is no way they can assure me that my fingerprint is not stored by default there is no way il buy another iphone...
everyone should do the same thing and send a clear message to Apple
Until apple allow other apps to make use of the scanner it's kind of pointless and totally under utilised at the moment.
For those who don't understand cryptographic one-way hashes, they cannot be reversed to produce the original data without a dictionary attack. A dictionary attack in this case would require a collection of actual human fingers or replicas of them to run through Apple's Touch ID to see which cryptographic hashes match the one stored on the device.
Also note, that their is a really really really small chance that two fingerprints will generate the same cryptographic hash. Cryptographic hashes by their very nature have LESS data than the source data for which they are hash. This means that the if the source data has potentially quadrillions of combinations that there may be only billions of values that they hash to (a one to many mapping of hashes to source data). More likely scenario is that your fingerprint hashes to the same value as a fingerprint that does not currently exist on the planet today and may never exist.
Think of a large 500-page book as a just a collection of letters, numbers, spaces, and punctation. You could pound on the keyboard and produce a book of random text or you could carefully craft an actual readable book. The hash reduces the book to a hash of say 500 characters which is generated in such a way that even changing a single letter in the book or the capitalization of a single letter produces an entirely different hash (cryptographic hash algorithms magnify any change to cyclically change other parts). Obviously, there is no way you could take 500 characters of data and regenerate the 500-page book (that would be the most amazing lossless-compression algorithm in the world, but also mathematically impossible). Because of this you cannot reverse it. You could however, run a hash on all books known to man to find the one that matches the same value (a dictionary attack). Finally, there is a possibility that two carefully crafted books hash to the same value, but it is far more likely that a book's hash would match some of the billions of permutations of random letters , numbers, spaces, and symbols that have never been bound into a book.
It is the same for fingerprint data. Your actual fingerprint could only be determined if somebody already had a replica of your finger in a database and could make Apple's Touch ID sensor generate the same hash from it. The worst somebody could do is break into your phone or prove that a phone did indeed belong to you. What's more, the odds of somebody else's fingerprint matching yours is like two monkeys pounding out the exact same content on a keyboard after an hour of bashing away at it. Either way, there is no chance of your fingerprint being cloned and used in other places to impersonate your presence.
Dear Apple, I'm sorry because I realise it's not really your fault, but I don't trust that the NSA haven't nobbled you, and nothing you have said so far leads me to um think different, as it were.
It's not called paranoid anymore.
This reply from an Apple spokesperson makes me more nervous, actually, because of its misdirection.
The distinction between a fingerprint and name correlation versus a "fingerprint data" and name correlation seems artificial.
If I get a phone that has this (likely) i will never turn this feature on.
No offence taken! But please read one of my earlier posts on these forums and then decide for yourself whether the tin-foil joke is really all that apt.
https://forums.macrumors.com/posts/17875081/
It's not paranoia when they are admitting going after everyone's data is part of their job!
That and if you were ever booked as part of an arrest, did military service, held a high level security clearance or applied for a drivers license in some states, the data is already there.
Now the question is, yes someone may find "your" fingerprints somewhere but that is not conclusive proof that you were there.
For the last twenty years, silicone materials and masking techniques have been around where you can easily lift a fingerprint off almost any smooth surface and apply it to a silicone material surface to make a counterfeit fingerprint impression. The cost of these materials is less than $20 and can be picked up at any good chemical or rubber supply shop.
I can see the DefCon seminar now, "How to spoof the iPhone 5S with Counterfeit Fingerprinting"
The basic techniques are out there on the 'net already.
This has always been my opinion as well. I'd genuinely be interested to hear this position be proven wrong, because as far as I can tell, it can't be.
I'm happy for intelligence services to snoop on me, my phone calls and my emails, I'm not involved in anything seedy and as long as it helps keep terrorists or other aggressors away from the people I care about, they can carry on.
Granted, you could preach privacy laws and all, but try using the "but it's wrong to spy" argument on a psychopath bent on the destruction and death of millions of people. Ain't gonna fly.
Even if the Info can not be used in court it most likely has been seen and or stored somewhere. Do you feel safer?! I thought that under the premiss of you being a terrorist (as we all seem to be now) they sort of had cart blanche.
What a ridiculous claim. If you're storing enough about the fingerprint to do reliable identification, then you are for all intents and purposes storing the fingerprint itself.
so your prints are on the phone screen/home button.. someone can dust it and make a copy clone and makes a 3D print out of it and wala your key has been copied![]()
They are only allowed to search the content of your phone with a search warrant. There have been cases where phones were searched during an arrest, there is now precedence that this is illegal and any evidence found is inadmissible.
People in USA must really be terrified of NSA!!
Are you guys all criminals or something?![]()