Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
It's funny how the Apple fanboys try to deny the fact that it's pretty easy to bypass the security of their new gadget. I own Apple products myself so don't get me wrong. But the CCC isn't a joke that claims stuff they didn't test. You just need a fingerprint on a bottle or something like that. And as someone already pointed out. Most of your scanners do 2400 dpi so no problem.

So a thief walks into a Starbucks where an iPhone 5S and a Samsung Galaxy S4 are sitting next to each other. He notices the owner of the iPhone 5S is using the finger print scanner. Guess which phone he steals?

Frankly, most thieves who are going to target Smart phones are looking for a quick few hundred bucks. They aren't looking for a process that will take them hours to do. Why waste several hours of their time (obtaining a good finger print, scanning it, printing it, etc., etc.) when they could just steal another one?

And quite frankly, I have nothing on my phone worth that kind of effort. Even if we end up with e-wallets, we will treat our phones like our credit cards and call in a lost card (in this case a phone) as soon as we realize it which would take a lot less time than it does to do this "hack"....
 
Huh? Haven't we known this is a way around these sensors?

I have a way to bypass a password too...Look at the post-it of a users passwords and copy them down. Then type it into the iPhone to bypass the login.

</sarcasm>

Or peek over their shoulder as they type in their passcode. Or look at surveillance cam footage of someone doing the same. Or just grab the phone and do a brute force attack on the 4-digit passcode. Etc. etc.

The fingerprint scan still provides better security. First, you'd have to get someone to consent to a 2400 dpi scan of their finger, or somehow do it covertly. Then you'd have to go through the elaborate process of making a print the scanner would recognize. Then you have to actually get ahold of their phone so you can physically use the print. In any case, it would be easier to just force a person to enter their passcode (or scan their finger) at gunpoint. No password can defeat that.
 
The sensor should included something that detects a human pulse.

Boy Apple is on a roll.

1) No iPhones 5S until sometime in October
2) Finger ID easily thwarted
3) Apple TV Bricking

Bad :apple:

Not going to be good for Apple stock tomorrow.
 
Even if they could get a perfect scan of your print how long would it take them to get it and set this up?
Judging from previous reports on fingerprint replicas for bypassing systems like this one, probably less than an hour.
 
So a thief walks into a Starbucks where an iPhone 5S and a Samsung Galaxy S4 are sitting next to each other. He notices the owner of the iPhone 5S is using the finger print scanner. Guess which phone he steals?

The iphone 5s. Nicer phone :)

----------

The sensor should included something that detects a human pulse.

Boy Apple is on a roll.

1) No iPhones 5S until sometime in October
2) Finger ID easily thwarted
3) Apple TV Bricking

Bad :apple:

Not going to be good for Apple stock tomorrow.

lolwut
 
They should really have had a different person use the print.

When the scanner reads through the outer layer of skin, is it unique across different fingers?
 
bollocks

TouchID works by reading the epidermal layers of your finger. The same guy who registered his print, put some latex on his finger and unlocked. Show me someone else doing it and I'll be more impressed.
 
The sheet he has on his finger looks like it is clear. How do we know its not just scanning his finger through the paper?

My thoughts exactly. I would have been 'convinced' if a DIFFERENT person then lifted that piece of paper and used that to circumvent the lock.

Furthermore, how do we know the phone was locked? It could simply have been that he pressed the button to unlock it.

If however this is genuine, that means more work for Apple, I guess.
 
It's funny how the Apple fanboys try to deny the fact that it's pretty easy to bypass the security of their new gadget. I own Apple products myself so don't get me wrong. But the CCC isn't a joke that claims stuff they didn't test. You just need a fingerprint on a bottle or something like that. And as someone already pointed out. Most of your scanners do 2400 dpi so no problem.

It's funny how Android fanboys ignore the fact that a fingerprint sensor is better security than face unlock that can be fooled by low quality printed pictures...
 
I am so impressed by this guy's ability to unlock a door with a copy of his key.

But on a serious note, this is kind of a concern for people that value their security more. It's comforting to know that a severed finger won't unlock the 5s, however it's less comforting to know that it won't even require that. If Apple rectifies this, bravo; I personally won't be losing any sleep over this.
 
Last edited:
Or peek over their shoulder as they type in their passcode. Or look at surveillance cam footage of someone doing the same. Or just grab the phone and do a brute force attack on the 4-digit passcode. Etc. etc.

The fingerprint scan still provides better security. First, you'd have to get someone to consent to a 2400 dpi scan of their finger, or somehow do it covertly. Then you'd have to go through the elaborate process of making a print the scanner would recognize. Then you have to actually get ahold of their phone so you can physically use the print. In any case, it would be easier to just force a person to enter their passcode (or scan their finger) at gunpoint. No password can defeat that.

How about lifting the finger print off the home button and put it in the scanner...
 
This reminds me of using a can of compressed air to cool the RAM chips to read the contents of the RAM... even after the computer has been rebooted.

Yeah... it can happen... but it's highly unlikely.
 
That's not a 5s. ******** video.

Um, excellent reporting MacRumors. Notice how the screen size, and silver edge on a black phone are indicative of an iPhone 4 or 4s? Well, then it doesn't have a TouchID sensor.

If it does, it was hacked in, probably improperly. But it doesn't appear that they even tried to fake that, as the Home button doesn't have the 5s' characteristic metallic edge.

******** video. ******** 'reporting' of ********.
 
The Team used a 2400 DPI scan its just to save time R&D, coz Its easy to get a 2400 DPI quality fingerprint from a 300dpi photo (as on most ID) just processing it as vector image.

But most important thing is that's is very easy to get an fingerprint image just from a glass, and most objects just as police does.

That's all, if this **** is integrated to the Next iPad I'll disable it (no way I'll purchase an iPhone 5s , has no enough features to consider it an attractive upgrage.
 
if someone can unlock it with a fingerprint taken from the phone (or bottle, or whatever) and not directly scanning the finger (how would that ever happen in RL?), then i'd be worried. but not like this.
 
Um, excellent reporting MacRumors. Notice how the screen size, and silver edge on a black phone are indicative of an iPhone 4 or 4s? Well, then it doesn't have a TouchID sensor.

If it does, it was hacked in, probably improperly. But it doesn't appear that they even tried to fake that, as the Home button doesn't have the 5s' characteristic metallic edge.

******** video. ******** 'reporting' of ********.

It's an 5s "space gray"
 
I thought the sensor was supposed to read the skin layer behind the fingerprint :confused:

It does, which is why I believe that the phone just read his own fingerprint through the media he was using as the "fingerprint".
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.