Just a week after Apple released its brand new iPhone X on November 3, a team of researchers has claimed to successfully hack Apple's Face ID facial recognition technology with a mask that costs less than $150. They said Apple iPhone x face id can be hacked with silicon mask easily.
apple iPhone x face id hacked
Yes, Apple's "ultra-secure" Face ID security for the iPhone X is not as secure as the company claimed during its launch event in September this year.
"Apple engineering teams have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID," Apple's senior VP of worldwide marketing Phil Schiller said about Face ID system during the event.
"These are actual masks used by the engineering team to train the neural network to protect against them in Face ID."
However, the bad news is that researchers from Vietnamese cybersecurity firm Bkav were able to unlock the iPhone X using a mask.
Yes, Bkav researchers have a better option than holding it up to your face while you sleep. Bkav researchers re-created the owner's face through a combination of 3D printed mask, makeup, and 2D images with some "special processing done on the cheeks and around the face, where there are large skin areas" and the nose is created from silicone.
The researchers have also published a proof-of-concept video, showing the brand-new iPhone X first being unlocked using the specially constructed mask, and then using the Bkav researcher's face, in just one go.
"Many people in the world have tried different kinds of masks but all failed. It is because we understand how AI of Face ID works and how to bypass it," an FAQ on the Bkav website said.
"You can try it out with your own iPhone X, the phone shall recognize you even when you cover a half of your face. It means the recognition mechanism is not as strict as you think, Apple seems to rely too much on Face ID's AI. We just need a half face to create the mask. It was even simpler than we ourselves had thought."
Researchers explain that their "proof-of-concept" demo took about five days after they got iPhone X on November 5th. They also said the demo was performed against one of their team member's face without training iPhone X to recognize any components of the mask.
"We used a popular 3D printer. The nose was made by a handmade artist. We use 2D printing for other parts (similar to how we tricked Face Recognition 9 years ago). The skin was also hand-made to trick Apple's AI," the firm said.
The security firm said it cost the company around $150 for parts (which did not include a 3D printer), though it did not specify how many attempts its researchers took them to bypass the security of Apple's Face ID.
It should be noted that creating such a mask to unlock someone's iPhone is a time-consuming process and it is not possible to hack into a random person's iPhone.
However, if you prefer privacy and security over convenience, we highly recommend you to use a passcode instead of fingerprint or Face ID to unlock your phone.
Related postsapple iPhone x face id hacked
Yes, Apple's "ultra-secure" Face ID security for the iPhone X is not as secure as the company claimed during its launch event in September this year.
"Apple engineering teams have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID," Apple's senior VP of worldwide marketing Phil Schiller said about Face ID system during the event.
"These are actual masks used by the engineering team to train the neural network to protect against them in Face ID."
However, the bad news is that researchers from Vietnamese cybersecurity firm Bkav were able to unlock the iPhone X using a mask.
Yes, Bkav researchers have a better option than holding it up to your face while you sleep. Bkav researchers re-created the owner's face through a combination of 3D printed mask, makeup, and 2D images with some "special processing done on the cheeks and around the face, where there are large skin areas" and the nose is created from silicone.
The researchers have also published a proof-of-concept video, showing the brand-new iPhone X first being unlocked using the specially constructed mask, and then using the Bkav researcher's face, in just one go.
"Many people in the world have tried different kinds of masks but all failed. It is because we understand how AI of Face ID works and how to bypass it," an FAQ on the Bkav website said.
"You can try it out with your own iPhone X, the phone shall recognize you even when you cover a half of your face. It means the recognition mechanism is not as strict as you think, Apple seems to rely too much on Face ID's AI. We just need a half face to create the mask. It was even simpler than we ourselves had thought."
Researchers explain that their "proof-of-concept" demo took about five days after they got iPhone X on November 5th. They also said the demo was performed against one of their team member's face without training iPhone X to recognize any components of the mask.
"We used a popular 3D printer. The nose was made by a handmade artist. We use 2D printing for other parts (similar to how we tricked Face Recognition 9 years ago). The skin was also hand-made to trick Apple's AI," the firm said.
The security firm said it cost the company around $150 for parts (which did not include a 3D printer), though it did not specify how many attempts its researchers took them to bypass the security of Apple's Face ID.
It should be noted that creating such a mask to unlock someone's iPhone is a time-consuming process and it is not possible to hack into a random person's iPhone.
However, if you prefer privacy and security over convenience, we highly recommend you to use a passcode instead of fingerprint or Face ID to unlock your phone.
- Pentest Tools Android
- Hacker Tools 2019
- Hack Tools Download
- Hackrf Tools
- Pentest Tools Find Subdomains
- Hack Apps
- Black Hat Hacker Tools
- Computer Hacker
- Black Hat Hacker Tools
- Pentest Tools Free
- Hacker Tools Github
- Pentest Tools Apk
- Pentest Tools Android
- Pentest Tools Kali Linux
- Hacking Tools Free Download
- Pentest Tools Subdomain
- Pentest Tools Website Vulnerability
- Hacking Tools Online
- Hacker Tools
- Hacking Tools And Software
- Pentest Tools Website Vulnerability
- Underground Hacker Sites
- Underground Hacker Sites
- Free Pentest Tools For Windows
- Hacker Tools For Ios
- Hacking Tools Github
- Hacking Tools
- Pentest Tools Download
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Windows
- Hack And Tools
- Pentest Tools Download
- Pentest Tools For Mac
- Hacker Tools Github
- Hack Tools For Windows
- Pentest Tools Url Fuzzer
- Hacking Tools Free Download
- Hacking Tools Usb
- Pentest Tools Review
- Hacking Tools 2020
- Black Hat Hacker Tools
- Usb Pentest Tools
- Pentest Tools Review
- Hacking Tools Windows 10
- Hacker Security Tools
- Hacking Tools 2020
- Hacker Tool Kit
- Install Pentest Tools Ubuntu
- Pentest Tools Bluekeep
- Pentest Recon Tools
- Hacking Tools Usb
- Hacking Tools Pc
- Pentest Tools Github
- Hacking Tools Pc
- Hackrf Tools
- Pentest Tools Kali Linux
- Top Pentest Tools
- Hack Tools
- Hacking Tools For Windows 7
- Kik Hack Tools
- Hacker
- Pentest Box Tools Download
- Hacking Tools For Mac
- Hacker Tools Software
- How To Hack
- Hacker Hardware Tools
- Hacking Tools For Windows 7
- Hackers Toolbox
- Pentest Tools Port Scanner
- Hacker Tools 2019
- Hacking Tools For Windows
- Bluetooth Hacking Tools Kali
- Hack And Tools
- Hack Tools 2019
- Pentest Tools For Windows
- Hacker Security Tools
- Hack Website Online Tool
- What Are Hacking Tools
- Hacker Security Tools
- Pentest Tools
- Hacking Tools 2019
- Hacker Tools Free Download
- New Hacker Tools
- Hacking Tools Pc
- Github Hacking Tools
- Hacker Tools Apk Download
- Best Hacking Tools 2020
- Hacking Tools Mac
- Pentest Tools Open Source
- Pentest Tools Nmap
- Hacker Tools Free
- Hacker Tools 2020
- Hacking Tools And Software
- Top Pentest Tools
- Hack Tools 2019
- Hacking Tools And Software
- Hacker Tools Free Download
- Hacker Tools For Ios
Nenhum comentário:
Postar um comentário