TIME

NEPAL QATAR BELFAST, UK MALAYSIA DUBAI

Sunday, January 21, 2024

APPLE IPHONE X FACE ID CAN BE HACKED WITH SILICON MASK

Just a week after Apple released its brand new iPhone X on November 3, a team of researchers has claimed to successfully hack Apple's Face ID facial recognition technology with a mask that costs less than $150. They said Apple iPhone x face id can be hacked with silicon mask easily.

apple iPhone x face id hacked
Yes, Apple's "ultra-secure" Face ID security for the iPhone X is not as secure as the company claimed during its launch event in September this year.

"Apple engineering teams have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID," Apple's senior VP of worldwide marketing Phil Schiller said about Face ID system during the event.

"These are actual masks used by the engineering team to train the neural network to protect against them in Face ID."

However, the bad news is that researchers from Vietnamese cybersecurity firm Bkav were able to unlock the iPhone X using a mask.

Yes, Bkav researchers have a better option than holding it up to your face while you sleep. Bkav researchers re-created the owner's face through a combination of 3D printed mask, makeup, and 2D images with some "special processing done on the cheeks and around the face, where there are large skin areas" and the nose is created from silicone.

The researchers have also published a proof-of-concept video, showing the brand-new iPhone X first being unlocked using the specially constructed mask, and then using the Bkav researcher's face, in just one go.

"Many people in the world have tried different kinds of masks but all failed. It is because we understand how AI of Face ID works and how to bypass it," an FAQ on the Bkav website said.

"You can try it out with your own iPhone X, the phone shall recognize you even when you cover a half of your face. It means the recognition mechanism is not as strict as you think, Apple seems to rely too much on Face ID's AI. We just need a half face to create the mask. It was even simpler than we ourselves had thought."

Researchers explain that their "proof-of-concept" demo took about five days after they got iPhone X on November 5th. They also said the demo was performed against one of their team member's face without training iPhone X to recognize any components of the mask.

"We used a popular 3D printer. The nose was made by a handmade artist. We use 2D printing for other parts (similar to how we tricked Face Recognition 9 years ago). The skin was also hand-made to trick Apple's AI," the firm said.

The security firm said it cost the company around $150 for parts (which did not include a 3D printer), though it did not specify how many attempts its researchers took them to bypass the security of Apple's Face ID.

It should be noted that creating such a mask to unlock someone's iPhone is a time-consuming process and it is not possible to hack into a random person's iPhone.

However, if you prefer privacy and security over convenience, we highly recommend you to use a passcode instead of fingerprint or Face ID to unlock your phone.
Related news
  1. Pentest Tools Bluekeep
  2. Termux Hacking Tools 2019
  3. Game Hacking
  4. Hacker Techniques Tools And Incident Handling
  5. Pentest Reporting Tools
  6. Hacker Search Tools
  7. Hack Tools 2019
  8. Hacker Tools
  9. Ethical Hacker Tools
  10. Usb Pentest Tools
  11. Hackers Toolbox
  12. Tools Used For Hacking
  13. Pentest Tools Bluekeep
  14. Hacking Tools Hardware
  15. Install Pentest Tools Ubuntu
  16. Hacker Tools Free
  17. Github Hacking Tools
  18. Beginner Hacker Tools
  19. Tools 4 Hack
  20. Hacking Tools Kit
  21. Top Pentest Tools
  22. Hacker Tools For Mac
  23. Hack Tools For Mac
  24. Tools For Hacker
  25. Hacking Apps
  26. Pentest Tools Github
  27. Tools Used For Hacking
  28. Hacker Tools Free Download
  29. Pentest Tools Subdomain
  30. Game Hacking
  31. Hacking Tools For Windows Free Download
  32. Github Hacking Tools
  33. Hacker Hardware Tools
  34. Hack Tools Github
  35. Hack Tools Online
  36. Hacking Tools Download
  37. Hacker Tools Free
  38. Tools For Hacker
  39. Tools 4 Hack
  40. Tools Used For Hacking
  41. Hackers Toolbox
  42. Hacking Tools Download
  43. Pentest Reporting Tools
  44. Hacking Tools Online
  45. How To Hack
  46. Hacking Tools 2020
  47. Computer Hacker
  48. Easy Hack Tools
  49. How To Hack
  50. Hack Tools Mac
  51. Pentest Tools Linux
  52. How To Make Hacking Tools
  53. Pentest Tools Alternative
  54. Hacking Tools And Software
  55. Hacking Tools Online
  56. Hacker Tool Kit
  57. Hacker Tools Online
  58. Hacks And Tools
  59. Nsa Hack Tools
  60. Hack Tools For Windows
  61. Hacking Tools For Mac
  62. Hack Tool Apk
  63. Hacker Techniques Tools And Incident Handling
  64. Blackhat Hacker Tools
  65. Wifi Hacker Tools For Windows
  66. Hack Tools For Windows
  67. Pentest Tools Download
  68. Hacking Tools For Windows Free Download
  69. Pentest Tools For Windows
  70. Hack Tools For Pc
  71. New Hack Tools
  72. Hacker Tools Linux
  73. Pentest Tools Free
  74. Hacking Tools 2019
  75. Physical Pentest Tools
  76. Pentest Tools Tcp Port Scanner
  77. Pentest Tools Open Source
  78. Hack Tools For Windows
  79. Kik Hack Tools
  80. Hack Tools For Ubuntu
  81. Tools Used For Hacking
  82. Hacking Tools Windows 10
  83. Android Hack Tools Github
  84. Computer Hacker
  85. Pentest Tools Subdomain
  86. Hacker Tools Free Download
  87. Hack Rom Tools
  88. Hacking Tools Github
  89. Pentest Tools List
  90. Hack App
  91. Hacker Tools Online
  92. Hacking Tools Windows
  93. Pentest Tools Port Scanner
  94. Pentest Tools Url Fuzzer
  95. Hacker Tools Free Download
  96. Hacking Tools Free Download
  97. Game Hacking
  98. Hack Tool Apk No Root
  99. Best Hacking Tools 2020
  100. Hacker Tools Free
  101. Hackrf Tools
  102. Hacking Tools Windows
  103. Hacker Tool Kit
  104. Hack Tools
  105. Hacker Tools Free Download
  106. Github Hacking Tools
  107. Pentest Recon Tools
  108. Hack Tools Github

No comments:

Post a Comment