{"id":10040,"date":"2016-02-26T00:03:41","date_gmt":"2016-02-26T05:03:41","guid":{"rendered":"http:\/\/www.techwalls.com\/?p=10040"},"modified":"2016-02-26T00:04:48","modified_gmt":"2016-02-26T05:04:48","slug":"hackers-can-breach-handset-using-play-doh","status":"publish","type":"post","link":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/","title":{"rendered":"How hackers can breach your handset using only Play-Doh"},"content":{"rendered":"<p>We normally think of fingerprint scanners used for authentication as an advancement in mobile security. Think again.<!--more--><\/p>\n<p>A startup company based in China recently showed how hackers with malicious intent can gain unwarranted access to your personal device using only Play-Doh, a popular modeling compound used by children for creating various shapes.<\/p>\n<p>For its assessment, Vkansee tested the Play-Doh on an iPhone\u2019s fingerprint sensor and exhibited how the device can be unlocked by just replicating an owner\u2019s fingerprint through the molding compound. The replica on the Play-Doh compound was then thrust to the iPhone\u2019s Touch ID fingerprint scanner and guess what, the device was unlocked.<\/p>\n<p><a href=\"https:\/\/www.techwalls.com\/iphone-6-plus-gold-t-mobile-review-first-apples-phablet\/iphone-6-plus-11\/\" rel=\"attachment wp-att-7802\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7802\" src=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg\" alt=\"iphone-6-plus-11\" width=\"1000\" height=\"673\" srcset=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg 1000w, https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11-300x202.jpg 300w, https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11-768x517.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>The use of Play-Doh as a tool to hack a smartphone, and an iPhone at that, raises concern over the level of sophistication among devices sold by Apple, which boasts of its keen focus on security. More to the point, the demonstration reveals what existing biometrics tools lack: a high level of complex systems to prevent any compromise.<\/p>\n<p>Apple has a pre-published reply to the issue. According to a section on its website, it believes each fingerprint is unique and even rare that the possibility of having alike two fingerprints is far more remote than we can think.<\/p>\n<p>One solution to this fingerprint scanner vulnerability is a fingerprint sensor that will be installed under the glass of the device. This will resist any attempt at hacking the biometrics-based verification tool. Existing fingerprint sensors have to be installed by cutting a hole in the phone.<\/p>\n<p>Vkansee explains that a fingerprint sensor sitting under the glass will prevent hacking attempts because of the third level details approach, meaning the sensor will determine the thickness of ridges on the user\u2019s finger and other unique characteristics of the finger.<\/p>\n<p><strong>Read also:\u00a0<a href=\"https:\/\/www.techwalls.com\/biometrics-multi-factor-verification-whats-best-security-approach\/\">Biometrics or multi-factor verification: what\u2019s the best security approach?<\/a><\/strong><\/p>\n<p>Current biometrics infrastructures are indeed too simple to hack. Manufacturers should begin to take security seriously by ramping up the level of sophistication in their biometrics systems. At present, there is an ongoing pursuit for more advanced biometrics methods to verify the identity of users who try to access a device. There is iris scanning that will make use of a phone\u2019s camera to authenticate an identity. Others plan to resort to gestures as a way of identifying unique behavioral traits.<\/p>\n<p>With all these becoming a reality, will the fingerprint scanning method be finally ditched? Only time can tell. But at present it seems highly unlikely. Instead, fingerprint sensors must increase in their level of complexity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We normally think of fingerprint scanners used for authentication as an advancement in mobile security. Think again.<\/p>\n","protected":false},"author":89,"featured_media":7802,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4],"tags":[74,20,387,17],"class_list":{"0":"post-10040","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-gadget","8":"tag-apple","9":"tag-iphone","10":"tag-security","11":"tag-smartphone","12":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How hackers can breach your handset using only Play-Doh<\/title>\n<meta name=\"description\" content=\"We normally think of fingerprint scanners used for authentication as an advancement in mobile security. Think again.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Authors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/\",\"url\":\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/\",\"name\":\"How hackers can breach your handset using only Play-Doh\",\"isPartOf\":{\"@id\":\"https:\/\/www.techwalls.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg\",\"datePublished\":\"2016-02-26T05:03:41+00:00\",\"dateModified\":\"2016-02-26T05:04:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\"},\"description\":\"We normally think of fingerprint scanners used for authentication as an advancement in mobile security. Think again.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#primaryimage\",\"url\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg\",\"contentUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg\",\"width\":1000,\"height\":673},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techwalls.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gadget\",\"item\":\"https:\/\/www.techwalls.com\/gadget\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How hackers can breach your handset using only Play-Doh\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techwalls.com\/#website\",\"url\":\"https:\/\/www.techwalls.com\/\",\"name\":\"TechWalls\",\"description\":\"Technology News | Gadget Reviews | Tutorials\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techwalls.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\",\"name\":\"Guest Authors\",\"url\":\"https:\/\/www.techwalls.com\/author\/guestauthor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How hackers can breach your handset using only Play-Doh","description":"We normally think of fingerprint scanners used for authentication as an advancement in mobile security. Think again.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/","twitter_misc":{"Written by":"Guest Authors","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/","url":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/","name":"How hackers can breach your handset using only Play-Doh","isPartOf":{"@id":"https:\/\/www.techwalls.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#primaryimage"},"image":{"@id":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg","datePublished":"2016-02-26T05:03:41+00:00","dateModified":"2016-02-26T05:04:48+00:00","author":{"@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84"},"description":"We normally think of fingerprint scanners used for authentication as an advancement in mobile security. Think again.","breadcrumb":{"@id":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#primaryimage","url":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg","contentUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2014\/10\/iphone-6-plus-11.jpg","width":1000,"height":673},{"@type":"BreadcrumbList","@id":"https:\/\/www.techwalls.com\/hackers-can-breach-handset-using-play-doh\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techwalls.com\/"},{"@type":"ListItem","position":2,"name":"Gadget","item":"https:\/\/www.techwalls.com\/gadget\/"},{"@type":"ListItem","position":3,"name":"How hackers can breach your handset using only Play-Doh"}]},{"@type":"WebSite","@id":"https:\/\/www.techwalls.com\/#website","url":"https:\/\/www.techwalls.com\/","name":"TechWalls","description":"Technology News | Gadget Reviews | Tutorials","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techwalls.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84","name":"Guest Authors","url":"https:\/\/www.techwalls.com\/author\/guestauthor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/10040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/comments?post=10040"}],"version-history":[{"count":0,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/10040\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media\/7802"}],"wp:attachment":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media?parent=10040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/categories?post=10040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/tags?post=10040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}