Launching the Attack - Deepstash
Launching the Attack

Launching the Attack

With the fingerprint in hand, all we need to do is place it on the scanner.

The team at Kraken was able to perform this well-known attack on the majority of devices available with them. Had this been a real attack, they would have had access to a vast range of sensitive information.

STASHED IN:

2

Wondering if hacking your fingerprint is too complicated, if not impossible? Think again.

STASHED IN:

0 Comments

MORE IDEAS FROM Your Fingerprint Can Be Hacked For $5. Here’s How.

Protecting Yourself From the Attack

A fingerprint should not be considered a secure alternative to a strong password. Doing so leaves your information — and, potentially, your cryptoassets — vulnerable to even the most unsophisticated of attackers.

It should be clear by now that, despite being unique to you, your fingerprint can still be exploited with relative ease. At best, you should only consider using it as second-factor authentication (2FA).

STASHED IN:

2

Convenience Comes With A Price

Fingerprint authentication is a convenient alternative to passwords and PIN codes. It comes with a cost, though. Because, unlike a regular password, you leave your fingerprint on taxi doors, phone screens, and glasses of wine at restaurants.

STASHED IN:

2

The Final Touch

For our final step, add some wood glue on top of the print to bring to life a fake fingerprint that we can use on a scanner.

STASHED IN:

2

Print The Image Onto An Acetate Sheet

Next, print the image onto an acetate sheet with the help of a laser printer — the toner creates a 3D structure of the fingerprint on the sheet.

STASHED IN:

2

By Spending Some Time With Photoshop

With this photo at anyone's disposal, an hour in Photoshop yields a decent negative.

STASHED IN:

2

Stealing the Fingerprint

To compromise your device or account, one doesn't even need direct access to your fingerprint. A photo of a surface you’ve touched will do.

STASHED IN:

2

Deepstash helps you become inspired, wiser and productive, through bite-sized ideas from the best articles, books and videos out there.

GET THE APP:

RELATED IDEA

1. Keep up to date – and don’t open up holes yourself:

When it comes to protecting yourself against hackers, step one is always to install software updates as soon as they become available: that’s as true on smartphones as it is on computers. Yes, updating can be a tiresome and intrusive process, and it sometimes brings annoying changes to the interface that you’re used to. All the same, a huge proportion of successful hacks exploit vulnerabilities that have already been patched; exposing yourself unnecessarily is just daft. I’d also strongly

11

STASHED IN:

39

What Is the Best Authenticator App?

Authy is better than Google Authenticator in a few ways. In addition to supporting the same list of websites and services, Authy also comes with free cloud backup and multi-device sync, allowing you to use 2FA no matter what device you’re on.

STASHED IN:

2

1. Passwords:

The most common passwords of vulnerable users are '123456' and 'password', according to a survey by security firm ImmuniWeb. Experts recommend 4 basic requirements for a strong password - an uppercase letter, a symbol, a numeral, and a minimum of 10 characters. Having a unique password for different accounts ensures hackers don't get easy access. Password management applications like Dashlane and Password Boss can help keep passwords locked down, security firm Norton says

3

STASHED IN:

5