A Vietnamese security firm claims to have bypassed the iPhone X's Face ID system using a silicone mask, a 3-D printed frame, and 2-D images of the eyes and mouth. "We were able to trick Apple's AI, as mentioned in the writing, because we understood how their AI worked and how to bypass it".
One week has passed, since Apple launched iPhone X, while the race between hackers to dodge its Face ID has finally come to an end.
Bkav says that it had created a fake mask that is made up of different materials meant for the different parts of the face. Bkav's elaborate Face ID workaround is quite complicated compared to that, which bolsters Apple's claims the new system is more secure than Touch ID.
"The mask is crafted by combining 3D printing with makeup and 2D images of eyes and lips, besides some special processing on the cheeks and around the face, where there are large skin areas, to fool the AI of Face ID", Ngo Tuan Anh, Bkav's vice president of cybersecurity, said in a statement.Читайте также: Two reportedly stabbed at Mall of America in Minnesota
"We just need half a face to create the mask". However, the security agency has not detailed the process of how they went about training the iPhone X with the original victim's face and then spoofed it with a 3D mask. Bkav has yet to release the technical details of the hacking proof-of-concept.
ANZ NZ head of digital and transformation Liz Maguire said: "iPhone Face ID is fantastic technology that will transform the way iPhone X users access online services - including mobile banking". "Security units' competitors, commercial rivals of corporations, and even nations might benefit from our PoC".
In 2008, Bkav was the first company in the world to show that face recognition was not an effective security measure for laptops when Toshiba, Lenovo and Asus used this technology for their products.
Bkav claims this proves facial recognition is "not mature enough" to trust on smartphones and PCs, and if substantiated by others makes it clear that it will not be able to protect your data if you are the subject of a targeted attack.При любом использовании материалов сайта и дочерних проектов, гиперссылка на обязательна.
«» 2007 - 2019 Copyright.
Автоматизированное извлечение информации сайта запрещено.
Код для вставки в блог