Wednesday, January 24, 2024

APPLE IPHONE X FACE ID CAN BE HACKED WITH SILICON MASK

Just a week after Apple released its brand new iPhone X on November 3, a team of researchers has claimed to successfully hack Apple's Face ID facial recognition technology with a mask that costs less than $150. They said Apple iPhone x face id can be hacked with silicon mask easily.

apple iPhone x face id hacked
Yes, Apple's "ultra-secure" Face ID security for the iPhone X is not as secure as the company claimed during its launch event in September this year.

"Apple engineering teams have even gone and worked with professional mask makers and makeup artists in Hollywood to protect against these attempts to beat Face ID," Apple's senior VP of worldwide marketing Phil Schiller said about Face ID system during the event.

"These are actual masks used by the engineering team to train the neural network to protect against them in Face ID."

However, the bad news is that researchers from Vietnamese cybersecurity firm Bkav were able to unlock the iPhone X using a mask.

Yes, Bkav researchers have a better option than holding it up to your face while you sleep. Bkav researchers re-created the owner's face through a combination of 3D printed mask, makeup, and 2D images with some "special processing done on the cheeks and around the face, where there are large skin areas" and the nose is created from silicone.

The researchers have also published a proof-of-concept video, showing the brand-new iPhone X first being unlocked using the specially constructed mask, and then using the Bkav researcher's face, in just one go.

"Many people in the world have tried different kinds of masks but all failed. It is because we understand how AI of Face ID works and how to bypass it," an FAQ on the Bkav website said.

"You can try it out with your own iPhone X, the phone shall recognize you even when you cover a half of your face. It means the recognition mechanism is not as strict as you think, Apple seems to rely too much on Face ID's AI. We just need a half face to create the mask. It was even simpler than we ourselves had thought."

Researchers explain that their "proof-of-concept" demo took about five days after they got iPhone X on November 5th. They also said the demo was performed against one of their team member's face without training iPhone X to recognize any components of the mask.

"We used a popular 3D printer. The nose was made by a handmade artist. We use 2D printing for other parts (similar to how we tricked Face Recognition 9 years ago). The skin was also hand-made to trick Apple's AI," the firm said.

The security firm said it cost the company around $150 for parts (which did not include a 3D printer), though it did not specify how many attempts its researchers took them to bypass the security of Apple's Face ID.

It should be noted that creating such a mask to unlock someone's iPhone is a time-consuming process and it is not possible to hack into a random person's iPhone.

However, if you prefer privacy and security over convenience, we highly recommend you to use a passcode instead of fingerprint or Face ID to unlock your phone.

Related links


  1. Top Pentest Tools
  2. Pentest Tools For Android
  3. Hacking Tools Online
  4. Pentest Tools Nmap
  5. Hacker Tools Online
  6. Hacker Tools For Ios
  7. Wifi Hacker Tools For Windows
  8. Hacking Tools 2020
  9. Hacking Tools Download
  10. Hacker Tools Mac
  11. Hacking App
  12. Hacking Tools Pc
  13. Hacking Apps
  14. Hacking Tools Mac
  15. Game Hacking
  16. Hacking Tools Windows
  17. Pentest Tools Tcp Port Scanner
  18. Hacking Tools And Software
  19. Pentest Tools For Ubuntu
  20. Hacker Tools 2020
  21. Hackrf Tools
  22. Hack App
  23. New Hacker Tools
  24. Hackers Toolbox
  25. Hacking Tools For Windows Free Download
  26. Hacker Tools Hardware
  27. Pentest Reporting Tools
  28. Hacking Tools For Pc
  29. Hacker Tool Kit
  30. Pentest Tools For Ubuntu
  31. Pentest Tools Windows
  32. Termux Hacking Tools 2019
  33. Free Pentest Tools For Windows
  34. Hacker Tool Kit
  35. Hacker Tools
  36. Pentest Reporting Tools
  37. Hacker Tools Linux
  38. Hacker Tools For Mac
  39. Hacking Tools Online
  40. Beginner Hacker Tools
  41. Hacker Tools Free
  42. Hacker Tools Linux
  43. Nsa Hack Tools Download
  44. Hacker Tools Hardware
  45. Top Pentest Tools
  46. Hacking Tools Online
  47. Hack Tools For Windows
  48. Hack Tools For Windows
  49. Hack Tools For Ubuntu
  50. Hacker Tool Kit
  51. Black Hat Hacker Tools
  52. Hack Tools For Windows
  53. Hacking Tools Windows 10
  54. Best Pentesting Tools 2018
  55. Termux Hacking Tools 2019
  56. Hacker Tool Kit
  57. Hacking Tools For Windows 7
  58. Hacking Tools
  59. New Hack Tools
  60. Termux Hacking Tools 2019
  61. Hacking Tools For Mac
  62. Black Hat Hacker Tools
  63. Hacking Tools And Software
  64. Hack Tools Online
  65. Tools 4 Hack
  66. Hacker Hardware Tools
  67. Hacker Techniques Tools And Incident Handling
  68. Hacker Tools For Mac
  69. Pentest Tools Website
  70. Hacker Tools Github
  71. Hacker Security Tools
  72. Hacker Tools For Ios
  73. Hack Tools
  74. Hacking Tools Name
  75. New Hack Tools
  76. Hacker Tools 2020
  77. Hacker Tools Github
  78. Physical Pentest Tools
  79. Hack Tools Download
  80. Nsa Hack Tools
  81. Pentest Tools Website Vulnerability
  82. Pentest Tools Framework
  83. Pentest Tools Website Vulnerability
  84. Hacker Tools 2019
  85. Pentest Tools Nmap
  86. Pentest Tools Apk
  87. Hacking Tools 2019
  88. Hak5 Tools
  89. Hacking Tools For Windows 7
  90. Hacking Tools For Windows
  91. Nsa Hack Tools Download
  92. Hack Tool Apk
  93. Black Hat Hacker Tools
  94. Pentest Tools For Mac
  95. World No 1 Hacker Software
  96. Nsa Hack Tools
  97. Pentest Tools For Ubuntu
  98. Pentest Box Tools Download
  99. Hacking Tools Usb
  100. Pentest Tools Port Scanner
  101. Hacker Tools List
  102. Hacking Tools For Pc
  103. Pentest Tools For Ubuntu
  104. Hacker Tool Kit
  105. Hacks And Tools
  106. Hack Tools For Mac
  107. Hacker Tools Linux
  108. Hack Rom Tools
  109. Pentest Tools Nmap
  110. Hacker Tools Apk Download
  111. Pentest Tools Apk
  112. Computer Hacker
  113. What Is Hacking Tools
  114. Hacking Tools Kit
  115. Pentest Tools Nmap
  116. Hacker Tools Apk
  117. Pentest Tools For Android
  118. Pentest Tools Port Scanner
  119. Growth Hacker Tools
  120. Android Hack Tools Github
  121. Hacker Techniques Tools And Incident Handling
  122. Hacking Tools Online
  123. Top Pentest Tools
  124. Hacker Hardware Tools
  125. Hacker Tools 2020
  126. New Hack Tools
  127. Hacking Tools Name
  128. Hacking Tools Github
  129. Hacker Tools For Windows
  130. Hack Tools For Games
  131. Hacking Tools For Windows
  132. Hacking Tools For Windows
  133. Hacking Tools For Windows
  134. Pentest Tools Bluekeep
  135. Hacker
  136. How To Install Pentest Tools In Ubuntu
  137. Nsa Hack Tools Download
  138. Pentest Tools Github
  139. Tools For Hacker
  140. Nsa Hack Tools Download
  141. Hacking Tools Mac
  142. Bluetooth Hacking Tools Kali
  143. Hacking Tools Github
  144. Pentest Tools Website
  145. Hacking Tools Kit
  146. Github Hacking Tools
  147. How To Make Hacking Tools
  148. Wifi Hacker Tools For Windows
  149. Hacking Tools Online
  150. Pentest Tools Subdomain
  151. Hacker

No comments:

Bloomberg - UTV

Must Watch...Ad may come initially.. wait for video.Also keep volume on

Disclaimer



This Document is subject to changes without prior notice and is intended only for the person or entity to which it is addressed to and may contain confidential and/or privileged material and is not for any type of circulation. Any review, retransmission, or any other use is prohibited. Kindly note that this document does not constitute an offer or solicitation for the purchase or sale of any financial instrument or as an official confirmation of any transaction.


The information contained herein is from publicly available data or other sources believed to be reliable. While I would endeavour to update the information herein on reasonable basis, I am under no obligation to update or keep the information current. Also, there may be regulatory, compliance, or other reasons that may prevent me from doing so. I do not represent that information contained herein is accurate or complete and it should not be relied upon as such. This document is prepared for assistance only and is not intended to be and must not alone betaken as the basis for an investment decision. The user assumes the entire risk of any use made of this information. Each recipient of this document should make such investigations as it deems necessary to arrive at an independent evaluation of an investment in the securities of companies referred to in this document (including the merits and risks involved), and should consult its own advisors to determine the merits and risks of such an investment. The investment discussed or views expressed may not be suitable for all investors. I do not undertake to advise you as to any change of my views. I may have issued other reports that are inconsistent with and reach different conclusion from the information presented in this report. This report is not directed or intended for distribution to, or use by, any person or entity who is a citizen or resident of or located in any locality, state, country or other jurisdiction, where such distribution, publication, availability or use would be contrary to law, regulation or which would subject me to any registration or licensing requirement within such jurisdiction. The securities described herein may or may not be eligible for sale in all jurisdictions or to certain category of investors. Persons in whose possession this document may come are required to inform themselves of and to observe such restriction. I may have used the information set forth herein before publication and may have positions in, may from time to time purchase or sell or may be materially interested in any of the securities mentioned or related securities. I may from time to time solicit from, or perform investment banking, or other services for, any company mentioned herein. Without limiting any of the foregoing, in no event shall I or any third party involved in, or related to, computing or compiling the information have any liability for any damages of any kind.