Skip to main content

Hacker reveals how to extract PIN of a smartphone from any selfie.

Corneal Key Logger can extract PIN
of any smartphone using the owner's selfie
If you thought biometrics was the
ultimate weapon of authentication,
you may be proved wrong by Starbug.
German researcher Jan Krissler, aka
Starbug is a hacker whose claim to
fame is breaching Apple's TouchID
and recreating the German defense
minister's thumbprint from a high-
res image.
Starbug has revealed that he can now decode anyone's smartphone PIN code from any selfie "image". of the owner.
Starbug and his colleagues have
extracted the reflection of
smartphone screens in the eye whites of "selfie" subjects, then they used an ultra-high resolution image techniques to extract the user's PIN code. Starbug presented his discovery
at the Biometrics 2015 conference in London.
His team also revealed a method to
take hi-res images of iris using a
high-resolution camera and
recreating them using a simple laser printer. They were also able to extract the reflection of phone
screens in the eye whites of "selfie"
subjects, then using ultra-high res
image techniques to glean the user's PIN code.
Here is an image of the "corneal key logger"
The team then used this technique to extract the iris data of German
chancellor Angela Merkel, using a
photo taken at a press conference. He said that these images could be
printed onto a contact lens and this
method can be used to hack any
biometric enabled authentication
device.
Starbug's speech also focussed on the vulnerability of fingerprint and facial technology, saying that together with iris these represented "90% of the biometrics market value".
" Everything is spoofable," he said.
Earlier Starbug had revealed how to make a dummy fingerprint to spoof Apple's Touch ID sensor, simply by lifting a fingerprint from a basic print scanner and then making a mould. He also revealed how to use a digital SLR camera with a 200ml lens to take fingerprints that can be
replicated from a distance – the
method used to extract German
Defense Minister Dr Von Der Leyen's thumbprint.
According to Starbug even
fingerprint sensors featuring liveness detection are at risk. "I can fool every fingerprint sensor in two hours", he said, welcoming challenges from manufacturers to beat their technology. Starbug said a simple photo of the users face is often more than enough – even for most infrared devices. Here "liveness detection is very important", he said.
Starbug also outlined a method to
bypass liveness detection that
demands that makes users blink, and he closed his presentation defeating a 3D facial recognition by using a papier mache mask.
Starbug said that the current
biometrics technology is weak and
should improved upon. However, he said he feels that biometrics is the future of the authentication.

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...