Fingerprint unlock is safe? You can copy other people's fingerprints with a photo.

Source: Internet
Author: User
Keywords To be shocked or shocked
Tags applied class copy crack electronic devices higher higher than it is
class= "Post_content" itemprop= "Articlebody" >

Fingerprint, as a unique biological feature, is gradually applied in electronic products, which is used as personal ID, which eliminates the procedure of password-losing. In terms of security, fingerprints are higher than PIN levels, are not easy to crack, and do not have to worry about being peeping, like face, Iris, it is becoming a user's passport on electronic devices ...

But villains outsmart, fingerprints are not only likely to be acquired through contact with objects, but also may be leaked through the most common photos, the largest hacker organization in Europe, Chaos Computer Club, claimed that they had successfully obtained fingerprints from several finger photographs.

In Germany Hamburg, a member of the Krissler showed how he copied the fingerprints of German defence Minister Ursula von der Leyen, and interestingly, the technology he used was a commercial software called Verifinger, Verifinger This is a fingerprint identification technology algorithm, provided by the German company Neuro technology, which includes fingerprint identification technology, fingerprint reduction technology, open SDK is widely used, is the industry's leading technology provider.

He said his data came from a photograph taken by the executive in a public appearance, photographed from several angles, to obtain a complete picture of the fingerprint, but he did not disclose how many pixels the camera was used.

That is to say, after you wave a wave, be captured by the person, your fingerprint information may be leaked, this sounds a bit scary, is it difficult for us to be able to expose hand to take pictures? In case someone videotaping your hand ...

Of course, this does not mean that fingerprint recognition immediately become chicken, security itself is relative, we can combine a variety of means to use. We still have to revisit the phrase, technology itself is innocent, the key depends on the industry norms and how it is used.

Finally, ordinary people in their daily life should be less likely to be photographed. Of course, if the unfortunate recruit, the other party must also steal your equipment or find the relevant biological certification system, so that the fingerprint data can be used. So there's no need to worry too much

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.