Launching the Attack - Deepstash
Machine Learning With Google

Learn more about technologyandthefuture with this collection

Understanding machine learning models

Improving data analysis and decision-making

How Google uses logic in machine learning

Machine Learning With Google

Discover 95 similar ideas in

It takes just

14 mins to read

Launching the Attack

Launching the Attack

With the fingerprint in hand, all we need to do is place it on the scanner.

The team at Kraken was able to perform this well-known attack on the majority of devices available with them. Had this been a real attack, they would have had access to a vast range of sensitive information.

8

66 reads

MORE IDEAS ON THIS

Stealing the Fingerprint

Stealing the Fingerprint

To compromise your device or account, one doesn't even need direct access to your fingerprint. A photo of a surface you’ve touched will do.

8

93 reads

By Spending Some Time With Photoshop

By Spending Some Time With Photoshop

With this photo at anyone's disposal, an hour in Photoshop yields a decent negative.

8

89 reads

Convenience Comes With A Price

Convenience Comes With A Price

Fingerprint authentication is a convenient alternative to passwords and PIN codes. It comes with a cost, though. Because, unlike a regular password, you leave your fingerprint on taxi doors, phone screens, and glasses of wine at restaurants.

8

135 reads

Protecting Yourself From the Attack

Protecting Yourself From the Attack

A fingerprint should not be considered a secure alternative to a strong password. Doing so leaves your information — and, potentially, your cryptoassets — vulnerable to even the most unsophisticated of attackers.

It should be clear by now that, despite being unique...

9

63 reads

The Final Touch

The Final Touch

For our final step, add some wood glue on top of the print to bring to life a fake fingerprint that we can use on a scanner.

8

91 reads

Print The Image Onto An Acetate Sheet

Print The Image Onto An Acetate Sheet

Next, print the image onto an acetate sheet with the help of a laser printer — the toner creates a 3D structure of the fingerprint on the sheet.

8

88 reads

CURATED FROM

CURATED BY

heisenberg

Digital marketing at dentsu. Invested in the symbiosis of marketing, psychology, and design. Photographer at heart.

Wondering if hacking your fingerprint is too complicated, if not impossible? Think again.

Related collections

More like this

The Pen And Paper

Even in this digital age, when automation is in full force and being swift on the keyboard is a crucial skill, using your hand and pencil is still on top of the charts for cognitive learning.

Every student of all age groups has one cognitive toolkit with them: a pe...

The Sign Of The Times

It is telling how fed up people are with the conditions of work — that people are now rejecting this worldview, and doing so to such a degree that it’s become a movement. If the movement has a motto, it would be the word that’s been on everyone’s lips over the past 18 months: burnout.

The Global Neuronal Workspace (GNW)

  • GNW argues that consciousness arises from a specific type of information processing, known from the beginnings of AI, when specialized programs would access a small, shared repository of information.
  • According to GNW, consciousness is when incoming sensory information is broadcast ...

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving & library

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Personalized recommendations

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates