class= "Post_content" itemprop= "Articlebody" >
Fingerprint, as a unique biological feature, is gradually applied in electronic products, which is used as personal ID, which eliminates the procedure of password-losing. In terms of security, fingerprints are higher than PIN levels, are not easy to crack, and do not have to worry about being peeping, like face, Iris, it is becoming a user's passport on electronic devices ...
But villains outsmart, fingerprints are not only likely to be acquired through contact with objects, but also may be leaked through the most common photos, the largest hacker organization in Europe, Chaos Computer Club, claimed that they had successfully obtained fingerprints from several finger photographs.
In Germany Hamburg, a member of the Krissler showed how he copied the fingerprints of German defence Minister Ursula von der Leyen, and interestingly, the technology he used was a commercial software called Verifinger, Verifinger This is a fingerprint identification technology algorithm, provided by the German company Neuro technology, which includes fingerprint identification technology, fingerprint reduction technology, open SDK is widely used, is the industry's leading technology provider.
He said his data came from a photograph taken by the executive in a public appearance, photographed from several angles, to obtain a complete picture of the fingerprint, but he did not disclose how many pixels the camera was used.
That is to say, after you wave a wave, be captured by the person, your fingerprint information may be leaked, this sounds a bit scary, is it difficult for us to be able to expose hand to take pictures? In case someone videotaping your hand ...
Of course, this does not mean that fingerprint recognition immediately become chicken, security itself is relative, we can combine a variety of means to use. We still have to revisit the phrase, technology itself is innocent, the key depends on the industry norms and how it is used.
Finally, ordinary people in their daily life should be less likely to be photographed. Of course, if the unfortunate recruit, the other party must also steal your equipment or find the relevant biological certification system, so that the fingerprint data can be used. So there's no need to worry too much