New To Mac-Forums?

Welcome to our community! Join the discussion today by registering your FREE account. If you have any problems with the registration process, please contact us!

Get your questions answered by community gurus Advice and insight from world-class Apple enthusiasts Exclusive access to members-only contests, giveaways and deals

Join today!

 
Start a Discussion
 

Mac-Forums Brief

Subscribe to Mac-Forums Brief to receive special offers from Mac-Forums partners and sponsors

Join the conversation RSS
Apple Rumors and Reports Discuss what's going on with Apple in this forum

iPhone 5S Touch ID hacked by fake fingerprints !!!!!


Post Reply New Thread Subscribe

 
Thread Tools
vansmith

 
vansmith's Avatar
 
Member Since: Oct 19, 2008
Location: Toronto
Posts: 17,677
vansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond reputevansmith has a reputation beyond repute
Mac Specs: 2012 13" MBP (2.5 i5, 8GB)

vansmith is online now
Quote:
Originally Posted by lifeisabeach View Post
I know what jailbreaks are. And it took, what, nearly a year to find a combination of vulnerabilities to crack iOS 6?
It took 0 days to exploit a vulnerability in iOS 6.

Does it matter though? I'm making an argument about their very existence, nothing more. I'm not trying to suggest that the software is of a bad quality (I even implied this above). In fact, I think iOS is of good quality from a security standpoint. That said, I'm not going to hide my head in the sand and think it's somehow immune to the inherent truth of software development - if it can be made, it can be (and likely will be) exploited.

Important Links: Community Guidelines : Use the reputation system if you've been helped.
M-F Blog :: Write for the blog
Personal Twitter
QUOTE Thanks
danny842003

 
Member Since: Jul 16, 2012
Posts: 86
danny842003 is an unknown at this point

danny842003 is offline
Quote:
Originally Posted by vansmith View Post
It took 0 days to exploit a vulnerability in iOS 6.

Does it matter though? I'm making an argument about their very existence, nothing more. I'm not trying to suggest that the software is of a bad quality (I even implied this above). In fact, I think iOS is of good quality from a security standpoint. That said, I'm not going to hide my head in the sand and think it's somehow immune to the inherent truth of software development - if it can be made, it can be (and likely will be) exploited.
But nobody has claimed it cant be. Just that with the mentioned security features its very hard to exploit it.
QUOTE Thanks
MacInWin

 
MacInWin's Avatar
 
Member Since: Jul 07, 2008
Location: Winchester, VA
Posts: 2,070
MacInWin is a name known to allMacInWin is a name known to allMacInWin is a name known to allMacInWin is a name known to allMacInWin is a name known to allMacInWin is a name known to allMacInWin is a name known to all
Mac Specs: 2011 MBP, 2008 iMac, iPhone 4S, iPad (Retina), 13" MBP and MacMini

MacInWin is offline
Quote:
Originally Posted by danny842003 View Post
But nobody has claimed it cant be. Just that with the mentioned security features its very hard to exploit it.
I wouldn't even say "very hard," just harder than not having it. Remember, I don't need to outrun the bear that's chasing us, I just have to be faster than you. Same in security. Nothing's perfect, it just needs to be somewhat better.

- Jake
QUOTE Thanks
arthur30

 
Member Since: Sep 27, 2013
Posts: 11
arthur30 is on a distinguished road

arthur30 is offline
The method that was used to hack the fingerprint id recognition is impractical because to get the thumb or finger impression of any person you will have to cut is finger or may be ask him to give you the impression which is much like stealing and has nothing to do with hacking or code hacking in person.
QUOTE Thanks

Post Reply New Thread Subscribe


« iPhone sinks as Android seizes market share | Apple offers a sneak peek at new Mac Pro at WWDC 2013 »
Thread Tools

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off
Forum Jump

All times are GMT -4. The time now is 01:19 PM.

Powered by vBulletin
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
X

Welcome to Mac-Forums.com

Create your username to jump into the discussion!

New members like you have made this community the ultimate source for your Mac since 2003!


(4 digit year)

Already a member?