From d7b502b1edecd8f3f0f603787a02292de07a62c0 Mon Sep 17 00:00:00 2001 From: erdgeist Date: Tue, 24 Sep 2013 17:36:33 +0000 Subject: committing page revision 13 --- updates/2013/ccc-breaks-apple-touchid.en.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'updates/2013') diff --git a/updates/2013/ccc-breaks-apple-touchid.en.md b/updates/2013/ccc-breaks-apple-touchid.en.md index dac0a4b8..673b38e1 100644 --- a/updates/2013/ccc-breaks-apple-touchid.en.md +++ b/updates/2013/ccc-breaks-apple-touchid.en.md @@ -1,6 +1,6 @@ title: Chaos Computer Club breaks Apple TouchID date: 2013-09-21 22:04:00 -updated: 2013-09-24 17:36:07 +updated: 2013-09-24 17:36:33 author: frank tags: update, pressemitteilung, biometrie, biometrics, apple, touchid, fingerprint @@ -49,7 +49,7 @@ The process described above proved to be somewhat unreliable as the depth of the ridges created by the toner was a little too shallow. Therefore an alternative process based on the same principle was utilized and has been demonstrated in an extended video available -[here](http://www.heise.de/video/artikel/The-iPhone-5s-Touch-ID-hack-in-detail-1966044.html "Refined TouchID hacking process"). First, +[here](http://heise.de/-1966044 "Refined TouchID hacking process"). First, the residual fingerprint from the phone is either photographed or scanned with a flatbed scanner at 2400 dpi. Then the image is converted to black & white, inverted and mirrored. This image is then printed onto -- cgit v1.2.3