IT’S an old cliché of security researchers: fingerprints might appear more secure than passwords. But if your password gets stolen, you can change it to a new one; what happens when your fingerprint gets copied?

That’s no longer an abstract fear: a speaker at the Chaos Communication Congress, an annual meeting of hackers in Germany, demonstrated his method for faking fingerprints using only a few high-definition photographs of his target, German defence minister Ursula von der Leyen.

Jan Krissler, known in hacker circles as Starbug, used commercial software called VeriFinger and several close-range photos of von der Leyen, including one gleaned from a press release issued by her own office and another he took himself from three meters away, to reverse-engineer the fingerprint.


Jan Krissler, also known as Starbug in hacker circles, considers his password safer than his fingerprints


“After this talk, politicians will presumably wear gloves when talking in public,” he joked.

Also reported at the conference was another security hole seemingly straight out of science-fiction: a so-called “corneal keylogger”. The idea behind the attack is simple. A hacker may have access to a user’s phone camera, but not anything else. How to go from there to stealing all their passwords?

GERMAN Defence Minister Ursula von der Leyen.
GERMAN Defence Minister Ursula von der Leyen.

One way, demonstrated on stage, is to read what they’re typing by analysing photographs of the reflections in their eyes. Smartphone cameras, even front-facing ones, are now high-resolution enough that such an attack is possible.

Starbug is no stranger to taking on biometric security. In a high-profile stunt in 2013, he spoofed Apple’s TouchID sensors within 24 hours of the release of the iPhone 5S. Using a smudge on the screen of an iPhone, he printed a dummy finger using wood glue and sprayable graphene, which successfully unlocked a phone registered to someone else’s thumb.

For that hack, he had to have physical access to the phone he stole the fingerprint from, in order to get a high-resolution scan of the print. His latest demonstration suggests that it may be possible to unlock a phone using a fingerprint stolen without ever touching a person or their property — although actually getting hold of the phone is still needed for the last stage, of actually unlocking it.

The increasing number of successful attacks against biometric identification has led to some security researchers advising that people change the way they think about security measures such as fingerprints and photo ID. Rather than treating them as a replacement for passwords, they should instead be used as a second factor of authentication, or even as something similar to a username: a publicly known piece of information which must be linked to a password before a user can log in.

As the ACLU’s Jay Stanley told The Washington Post, “Biometrics are not secrets... Ideally, they’re unique to each individual, but that’s not the same thing as being a secret.”

And Starbug agrees, telling Zeit in 2013 that “I consider my password safer than my fingerprint... My password is in my head, and if I’m careful when typing, I remain the only one who knows it.”

—By arrangement with the Guardian

Published in Dawn, January 1st, 2015

Opinion

Editorial

Dangerous law
Updated 17 May, 2024

Dangerous law

It must remember that the same law can be weaponised against it one day, just as Peca was when the PTI took power.
Uncalled for pressure
17 May, 2024

Uncalled for pressure

THE recent press conferences by Senators Faisal Vawda and Talal Chaudhry, where they demanded evidence from judges...
KP tussle
17 May, 2024

KP tussle

THE growing war of words between KP Chief Minister Ali Amin Gandapur and Governor Faisal Karim Kundi is affecting...
Dubai properties
Updated 16 May, 2024

Dubai properties

It is hoped that any investigation that is conducted will be fair and that no wrongdoing will be excused.
In good faith
16 May, 2024

In good faith

THE ‘P’ in PTI might as well stand for perplexing. After a constant yo-yoing around holding talks, the PTI has...
CTDs’ shortcomings
16 May, 2024

CTDs’ shortcomings

WHILE threats from terrorist groups need to be countered on the battlefield through military means, long-term ...