The Touch ID in the iPhone 5S was tricked by hackers (Video)

[youtube]http://youtu.be/HM8b8d8kSNQ[/youtube]

  Apple stated that the system touch ID from iPhone 5S it cannot be broken by hackers, its data being encrypted in a chip inside the chip A7. Those who analyzed in detail the technology of the fingerprint reader from iPhone 5S they stated that it can only be used by living people, so theoretically a fingerprint placed on any kind of support could not unlock the terminal or authorize payments. Well, in the video clip above we have a demonstration of how the system was tricked touch ID, but we are not talking about breaking it.

First, the fingerprint of the enrolled user is photographed with 2400 dpi resolution. The resulting image is then cleaned up, inverted and laser printed with 1200 dpi onto transparent sheet with a thick toner setting. Finally, pink latex milk or white woodglue is smeared into the pattern created by the toner onto the transparent sheet. After it cures, the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone. This process has been used with minor refinements and variations against the vast majority of fingerprint sensors on the market.

  To trick the system, the user's fingerprint was recorded in a picture with a resolution of 2400 dpi, the image being inverted and printed with a laser on a transparent sheet at a resolution of 1200 dpi. After printing, pink latex is poured over the printed print, then the excess between the stripes is removed, and you can see the result in the video clip above. The method has been used to fool most of the fingerprint readers on the market and it seems to work without problems, this being the first case where Apple's system has been fooled but not broken.