{"id":401,"date":"2017-05-09T16:23:49","date_gmt":"2017-05-09T16:23:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/fingerprint-security-three-myths-busted\/"},"modified":"2019-05-29T12:20:17","modified_gmt":"2019-05-29T12:20:17","slug":"fingerprint-security-three-myths-busted","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/","title":{"rendered":"Fingerprint security: Three myths busted"},"content":{"rendered":"<p class=\"wls-paragraph\">Fingerprints have long been viewed as the ultimate identifier, unique only to you and impossible to steal, which is why fingerprint readers have become integral to smartphone and mobile device security.<\/p>\n<p class=\"wls-paragraph\">So, it seems, these gadgets must now be at their most secure. Well, not quite. We debunk three myths in this short feature to bring some clarity to the subject of fingerprint security.<\/p>\n<h2><strong>Myth 1: Fingerprint security more secure than passwords<\/strong><\/h2>\n<p class=\"wls-paragraph\">Contrary to what many people assume biometric readers are not foolproof. They have their own set of unique vulnerabilities, the technology can be exploited and fingerprints can be stolen (and <a href=\"http:\/\/www.telegraph.co.uk\/technology\/2017\/01\/12\/peace-sign-selfies-could-let-hackers-copy-fingerprints\/\" target=\"_blank\" rel=\"noopener noreferrer\">even from photographs<\/a>).<\/p>\n<p class=\"wls-paragraph\">For example, in America, it is <a href=\"https:\/\/www.dhs.gov\/xlibrary\/assets\/usvisit\/usvisit_edu_10-fingerprint_consumer_friendly_content_1400_words.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Homeland Security policy<\/a> to collect fingerprints from non-US citizens between the ages of 14 and 79 as they enter the country. Meanwhile, the FBI keeps a file of an estimated 100 million prints, of which more than 30 million are \u201ccivil prints\u201d, i.e. not linked to criminal activity.<\/p>\n<p class=\"wls-paragraph\">These two cited examples equate to repositories of sensitive information, which will appeal to cybercriminals. If this information can be accessed, then, just like credit cards and pin numbers, it is entirely possible for them to be stolen and used maliciously.<\/p>\n<h2><strong>Myth 2: You can\u2019t copy a fingerprint<\/strong><\/h2>\n<p class=\"wls-paragraph\">In 2013, Apple ushered in the era of the biometrical mainstream by <a href=\"https:\/\/www.apple.com\/pr\/library\/2013\/09\/10Apple-Announces-iPhone-5s-The-Most-Forward-Thinking-Smartphone-in-the-World.html\" target=\"_blank\" rel=\"noopener noreferrer\">announcing the addition of a fingerprint scanner to its iPhone 5s<\/a>. It promised to keep your phone super protected while providing a Touch ID method of purchasing things from iTunes and the App Store \u2013 effectively removing the need for passwords (not totally, mind you).<\/p>\n<p class=\"wls-paragraph\">But within two days of the new handset launching a German security researcher called <a href=\"http:\/\/www.ccc.de\/en\/updates\/2014\/ursel\">Starburg<\/a> used publicly available software called VeriFinger to recreate the fingerprints of Germany\u2019s Minister of Defence using high-resolution photos \u2013 claiming the copy was good enough to trick fingerprint systems for biometric authentication.<\/p>\n<p class=\"wls-paragraph\">More recently, in 2016, Biometrics firm Vkansee demonstrated that the \u201c<a href=\"http:\/\/vkansee.com\/watch-touch-id-get-fooled-with-some-play-doh\/\" target=\"_blank\" rel=\"noopener noreferrer\">technology can be spoofed<\/a>\u201d \u2013 all you need is clay and some Play-Doh and you can capture enough fingerprint details to dupe a sensor into thinking it\u2019s the real deal. However, the firm did state that the process is rather convoluted and unlikely to result in breaches of this ilk. Nevertheless, it does suggest that fingerprints can be copied.<\/p>\n<h2><strong>Myth 3: Fingerprints will replace passwords in the future<\/strong><\/h2>\n<p class=\"wls-paragraph\">Given that fingerprints can be stolen, copied and used to bypass today\u2019s readers, it\u2019s clear we have a long way to go before passwords are made obsolete. And even then, the likelihood is that passwords are going to be around for a long time.<\/p>\n<p class=\"wls-paragraph\">What this highlights is there is no single solution to security, with many experts advising an approach that embraces <a href=\"https:\/\/www.welivesecurity.com\/2015\/02\/05\/alternatives-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">multiple measures<\/a> so that ultimately, there is more than one entry point into whatever it is you seek to protect.<\/p>\n<p class=\"wls-paragraph\">In practice, this means a mix of fingerprints, passwords and additional security in the shape of two-factor authentication may be required, especially in instances where the information or assets \u2013 digital or physical \u2013 is of a particularly sensitive nature.<\/p>\n<p class=\"wls-paragraph\">&nbsp;Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/05\/04\/fingerprint-security-three-myths-busted\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fingerprints have long been viewed as the ultimate identifier, unique only to you and impossible to steal, which is why fingerprint readers have become integral to smartphone and mobile device security. So, it seems, these gadgets must now be at their most secure. Well, not quite. We debunk three myths in this short feature to<\/p>\n","protected":false},"author":5,"featured_media":1816,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[164],"tags":[],"class_list":["post-401","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fingerprint security: Three myths busted - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fingerprint security: Three myths busted\" \/>\n<meta property=\"og:description\" content=\"Fingerprints have long been viewed as the ultimate identifier, unique only to you and impossible to steal, which is why fingerprint readers have become integral to smartphone and mobile device security. So, it seems, these gadgets must now be at their most secure. Well, not quite. We debunk three myths in this short feature to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-09T16:23:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:20:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/16.-shutterstock_555161845-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Fingerprint security: Three myths busted\",\"datePublished\":\"2017-05-09T16:23:49+00:00\",\"dateModified\":\"2019-05-29T12:20:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/\"},\"wordCount\":512,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/16.-shutterstock_555161845-623x410.jpg\",\"articleSection\":[\"password\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/\",\"name\":\"Fingerprint security: Three myths busted - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/16.-shutterstock_555161845-623x410.jpg\",\"datePublished\":\"2017-05-09T16:23:49+00:00\",\"dateModified\":\"2019-05-29T12:20:17+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/16.-shutterstock_555161845-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/16.-shutterstock_555161845-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fingerprint security: Three myths busted\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/05\\\/09\\\/fingerprint-security-three-myths-busted\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fingerprint security: Three myths busted - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/","og_locale":"en_US","og_type":"article","og_title":"Fingerprint security: Three myths busted","og_description":"Fingerprints have long been viewed as the ultimate identifier, unique only to you and impossible to steal, which is why fingerprint readers have become integral to smartphone and mobile device security. So, it seems, these gadgets must now be at their most secure. Well, not quite. We debunk three myths in this short feature to","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-05-09T16:23:49+00:00","article_modified_time":"2019-05-29T12:20:17+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/16.-shutterstock_555161845-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Fingerprint security: Three myths busted","datePublished":"2017-05-09T16:23:49+00:00","dateModified":"2019-05-29T12:20:17+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/"},"wordCount":512,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/16.-shutterstock_555161845-623x410.jpg","articleSection":["password"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/","name":"Fingerprint security: Three myths busted - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/16.-shutterstock_555161845-623x410.jpg","datePublished":"2017-05-09T16:23:49+00:00","dateModified":"2019-05-29T12:20:17+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/16.-shutterstock_555161845-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/16.-shutterstock_555161845-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Fingerprint security: Three myths busted"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/05\/09\/fingerprint-security-three-myths-busted\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=401"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1816"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}