Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Digital Life
Is your endpoint data protected?
Average Rating:
Rate this article:  
How Safe Is Apple's Touch ID, Really?

How Safe Is Apple's Touch ID, Really?
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

Apple has probably erred on the side of usability before considering security when it comes to biometrics. Still, Touch ID has to be more secure than a four-digit password, which could easily be cracked in older iPhones. But, then again, how safe is your fingerprint? asked security analyst Paul Henry.
 


Now that the reviewers are done talking about what was missing from the iPhone 5s, some are taking a closer look at what the smartphone has that none of its competitors can claim: full-blown biometrics.

iPhone 5s introduces Touch ID, a James Bond-like way to securely unlock the device with your finger -- or, more accurately, fingerprint. Touch ID is built into the smartphone's home button and uses a laser cut sapphire crystal, together with the capacitive touch sensor, to take a high-resolution image of your fingerprint. The technology analyzes the fingerprint and promises accurate readings from any angle.

The Touch ID sensor recognizes the touch of a finger so the sensor is only activated when you mean to activate it. That preserves battery life. Addressing privacy concerns, Apple said fingerprint information is encrypted and stored securely in the Secure Enclave inside the A7 chip on the iPhone 5s. The data is never stored on Apple servers or backed up to iCloud. Beyond unlocking the device, Touch ID can also be used as a secure way to approve purchases from the iTunes Store, App Store or iBooks Store. Is this secure enough to be the future of smartphone security?

Reliability and Security

We caught up with Paul Henry, security and forensic analyst at Lumension, to get his take on Touch ID from a security perspective. He told us the fingerprint scanner has a potential to be a real game changer for personal device security -- if it's done right. As he sees it, there are two factors that will determine the real success of this new feature, which has undeniable potential: reliability and security.

"There's a lot riding on the reliability factor. Will it work if I go for a swim and try to use my phone with raisin hands? What if it's cold outside and my fingers have shriveled a bit? Can I use my phone then? he asked. "People aren't going to be happy if they're locked out of their phones because of environmental factors."

If it's not both reliable and convenient, users will turn it off, Henry said. He also questions the longevity. The Guardian posted a rumor that there will be a 500-scan limit, which could be used up in six months. Apple could not immediately be reached for comment, but that seems unlikely.

The Jury Is Out

On the security front, Henry is betting that Apple has erred on the side of usability before considering security. Still, Touch ID has to be more secure than a four-digit password, which could easily be cracked in older iPhones. But, then again, how safe is your fingerprint? Think about it for a minute. We leave our fingerprints everywhere -- and they are certainly all over the phone, Henry noted.

Next, Apple said it's securing the biometric data, but is it really safe? "They say it's encrypted and not shared with other applications, but we'll have to wait and see how it works in practice. We also need to know if it's a single sign-on approach. If a single fingerprint grants access to other services -- particularly iCloud -- that's a frightening prospect if Apple hasn't done a truly expert job at securing that local credential," Henry said. "Naturally, we'll continue to have more questions than answers until we can get our hands on some phones later this month to do some testing."

Henry's conclusion: right now all we have is hype. He's waiting for the facts that will inform him whether or not the iPhone 5s will truly be a game changer.
 

Tell Us What You Think
Comment:

Name:

Teen with crazy mom:

Posted: 2013-09-25 @ 9:28am PT
I am worried about my mom using my finger while I sleep to unlock my phone

Steven James:

Posted: 2013-09-14 @ 12:31pm PT
Jennifer, Henry and a lot of other folks are really missing the point. You said it yourself. #1, it is more secure than the passcode #2, it is highly usable .. Apple has taken relatively old technology that often worked terribly, and has made it so that it works.. will there be cases in which it does not work (e.g. raisin hands from soaking in water?) .. SURE... but guess what, I bet there is some other way to access the phone in that case.. .challenge questions or some other way. I guarantee it. That is why the touch ID *must* be used in conjunction with a passcode. If I were CIO of a company, I would insist that all mobile devices we purchase from now on be iOS devices for two reasons: 1. iOS devices are MUCH MUCH less prone to viruses and malware than Windows, Symbian and of course the virus-laden Android (aka Herpes of the mobile operating systems), and 2. with something like Touch ID, Apple is making real attempts and strides at making our devices MORE SECURE and it is making the devices less desirable to steal. Sounds like an awesome bit of technology to me.



Protect 100% of your Data The prevalence of laptops and mobile devices in the enterprise makes corporate data increasingly vulnerable to loss and breach. And yet, workforce productivity is now inextricably linked to mobility. Click here to access the white paper "Top 10 Endpoint Backup Mistakes" to learn more about how to confidently protect data across platforms and devices while also providing features designed to enhance the end user experience.


 Digital Life
1.   Glass Adds Voice Access to Contacts
2.   Samsung, B&N Partner on Nook Tablet
3.   Supervalu Suffers a Data Breach
4.   Sony Intros 'Album of the Day' App
5.   Online Sites vs. Retailing in India


advertisement
HTC One M8 Windows Phone Unveiled
Can be POS device for small business.
Average Rating:
Sprint Dumps T-Mobile Merger
Looks to the future with new chief exec.
Average Rating:
New App To Manage Time Better
Helping to organize your busy life.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Three New Lenovo PCs Aimed at Business Users
Businesses everywhere want computing solutions that do more for less money, and Lenovo has unveiled three new desktop PCs that offer solid computing at a budget-minded price.
 
Aruba Networks Handles Black Hat with Aplomb
It's not an easy job. Aruba Networks' task throughout the Black Hat USA conference in Las Vegas this month was to ensure thousands of attendees could connect without malicious attacks.
 

Mobile Technology Spotlight
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 
Samsung, B&N Target Amazon with Nook Tablet
They've seen the enemy and it is Amazon. So Samsung and Barnes & Noble are teaming up to combat their common foe with a 7-inch tablet that blends Samsung’s tech, Nook’s content and e-reader platform.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.