{"id":78573,"date":"2015-01-01T08:02:41","date_gmt":"2015-01-01T08:02:41","guid":{"rendered":"http:\/\/4cd.e16.myftpupload.com\/?p=78573"},"modified":"2015-01-01T08:02:41","modified_gmt":"2015-01-01T08:02:41","slug":"iphone-can-hacked-just-photo-thumb","status":"publish","type":"post","link":"https:\/\/citifmonline.com\/?p=78573","title":{"rendered":"Your iPhone can be hacked with just a photo of your thumb"},"content":{"rendered":"<p>Your fingerprint may not keep your iPhone safe any more. Someone has figured out how to use photos and commercially available software to break through an iPhone 6&#8217;s fingerprint sensor, known as Touch ID.<\/p>\n<p>Jan Krissler, a German hacker who also goes by the alias Starbug, demonstrated the hack at the annual Chaos Computer Club convention (something you may have seen trending on Twitter as #31c3) on Dec. 27.<\/p>\n<p>Krissler demonstrated the process in an hour-long presentation (which you can watch here in German). He said he used several high-definition, close-range photographs of German Defense Minister Ursula von der Leyen&#8217;s hand from different angles and the fingerprint-identification software called VeriFinger to replicate her fingerprint. He then created a dummy fingerprint from wood glue and plaster.<\/p>\n<p>This isn&#8217;t the first time Krissler&#8217;s done something like this. In 2013, Krissler used a smudge on the screen of an iPhone 5S to replicate a fingerprint and break into the phone.<\/p>\n<p>Our phone&#8217;s PIN codes may not be safe, either &#8212; Krissler suggested that the codes used to unlock a phone could be read in the reflections in a phone user&#8217;s eyes. Researchers from the University of Massachusetts demonstrated earlier this year that people can identify someone&#8217;s passcode by recording a video of him or her typing from more than 144 feet away.<\/p>\n<p>&nbsp;<\/p>\n<p>Source: Huffington Post<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your fingerprint may not keep your iPhone safe any more. Someone has figured out how to use photos and commercially available software to break through an iPhone 6&#8217;s fingerprint sensor, known as Touch ID. Jan Krissler, a German hacker who also goes by the alias Starbug, demonstrated the hack at the annual Chaos Computer Club [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":78575,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":[],"jnews_primary_category":[],"jnews_social_meta":[],"jnews_override_counter":[],"footnotes":""},"categories":[],"tags":[18,38],"class_list":["post-78573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-dr-akwasi-osei","tag-palaver-newspaper"],"_links":{"self":[{"href":"https:\/\/citifmonline.com\/index.php?rest_route=\/wp\/v2\/posts\/78573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/citifmonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/citifmonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/citifmonline.com\/index.php?rest_route=\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/citifmonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=78573"}],"version-history":[{"count":0,"href":"https:\/\/citifmonline.com\/index.php?rest_route=\/wp\/v2\/posts\/78573\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/citifmonline.com\/index.php?rest_route=\/wp\/v2\/media\/78575"}],"wp:attachment":[{"href":"https:\/\/citifmonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=78573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/citifmonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=78573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/citifmonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=78573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}