• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Apple Touch ID fingerprint scanner hacked By German Hackers

Updated on Oct 6, 2013 by Guest Authors

iPhone 5S just came in the market yesterday and today we heard the news that a group of German hackers have successfully infiltrated the Apple Touch ID fingerprint scanner on the iPhone 5S using basis everyday life items.

The video posted by the group shows how the iPhone 5S was fooled using a fake fingerprint image. According to Apple, the fingerprint scanner was introduced in order to add an additional layer of security to a person’s phone that will make it more prone to theft and steal. But the latest hack shows that it can be hacked easily but with a little twist.

Touch-ID-iphone-5s

How it was hacked

The method adopted by the hackers to hack the Apple Touch ID on iPhone 5S is not as simple as it looks like. Means not a common everyday thief can hack your iPhone 5S but still it defeats the purpose of the feature that Apple supposedly claimed to be much more secure than the previous fingerprint technologies.

The method of hacking involved taking a photograph of the person’s fingerprint that is enrolled onto the device with 2400 dpi resolution that is slightly higher than usual. According to one hacker nicknamed Starbug,” Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake”.

After the fingerprint is photographed, it is then printed out using a laser printer and a 1200 dpi print settings with a thick toner mode onto a transparent sheet of paper. After that, the only thing left is to apply pink latex milk, or a white wood glue on to the sheet that was printed out. After it is dried out a bit, it is then placed on the sensor and the iPhone 5S is unlocked.

This vulnerability also leads to another serious problem. The Apple Touch ID is also associated with iTunes store. If a person can access your fingerprint, it not only can unlock the phone but can literally buy anything from the iTunes store until your credit limit hits the maximum. We are yet to hear something from Apple over this potential security threat in iPhone 5S and we will update as soon as we hear something from them.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Comments

  1. Andrew Gitt says

    Sep 24, 2013 at 11:26 am

    And worse, the iOS 7 lock screen can also be hacked easily. Apple said they are going to fix it in the next patch but really, this isn’t good! Anyway, thank you for sharing Adeel.

    • jason gibson says

      Jul 4, 2019 at 12:59 am

      security features!??

Footer

KEF LS50 Bookshelf Speakers Review: A Sound Decision Over the LS50 Meta

ALLPOWERS SP033 200W Portable Solar Panel Review – Eco-Friendly Energy on the Go

3DMakerpro SEAL 3D Scanner Review – Real-Life Performance

Allpowers S2000 2000W Portable Power Station Review: A Missed Opportunity

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • KEF LS50 Bookshelf Speakers Review: A Sound Decision Over the LS50 Meta
  • Creality CR-Scan Ferret Pro: The New Age of 3D Scanning
  • How to Fix HomePod Timer and Alarm Issues: A Comprehensive Guide
  • iPhone 15 Plus Model Number A2847, A3093, A3094, A3096 Differences

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}