Moderators: richierich, ua900, PanAm_DC10, hOMSaR
Quoting a321luke (Reply 1): I'm patiently awaiting the 5S myself. I felt that the original 5 just wasn't enough to get me to upgrade. |
Quoting Klaus (Reply 3): The rumoured fingerprint sensor may be an aid and motivation to upgrade security for people who did not bother with a passcode at all thus far, but an actual passcode is still quite a bit more secure than a key you keep disseminating copies of on every door handle and on every drinking glass. |
Quoting scbriml (Reply 4): Seriously, for someone who really wants to get into your phone, dealing with a PIN is easier than trying to lift fingerprints. |
Quoting BestWestern (Reply 7): |
Quoting Klaus (Reply 3): Biometric keys are low-grade, but relatively high-convenience security. A passcode is lower-convenience but higher-grade security which is closer to my preference. And it doesn't need any additional sensor support. |
Quoting Kaphias (Reply 9): Still running an iPhone 4 here. Works fine, no issues, just a little slow. I'm planning to hold out for the iPhone 6, as I don't really have the need for any of the new features on the 5S. Hoping that the 6 will be a bigger breakthrough... if not, I'll be getting one regardless. |
Quoting virginblue4 (Reply 10): I never understand why people do this? That contributed absolutely nothing to this thread. |
Quoting rwy04lga (Reply 12): |
Quoting Jetsgo (Reply 13): |
Quoting Luftfahrer (Reply 11): How about both passcode and finger print? |
Quoting HomSar (Reply 15): My biggest hope is that they have a 128 GB model. |
Quoting HomSar (Reply 15): 128 GB model |
Quoting Klaus (Reply 3): The rumoured fingerprint sensor may be an aid and motivation to upgrade security for people who did not bother with a passcode at all thus far, but an actual passcode is still quite a bit more secure than a key you keep disseminating copies of on every door handle and on every drinking glass. |
Quoting Kaphias (Reply 9): Still running an iPhone 4 here. Works fine, no issues, just a little slow. I'm planning to hold out for the iPhone 6 |
Quoting DocLightning (Reply 8): I'll be upgrading mostly because my iPhone 5 is out of memory and if I'm going to buy a new phone, then I might as well get the latest model. |
Quoting DocLightning (Reply 21): We use fingerprint readers at work and it's not as insecure as you think. |
Quoting cmf (Reply 24): The ideas some people have about security never stops to amaze me. Apparently it is easier to find someones fingerprint and create a usable replica than it is to read the pin code someone is entering. I know an eight year old kid who has access to every phone around him and he has not lifted a single fingerprint... |
Quoting Klaus (Reply 26): How do you "read" my passcode? I take care to not have the display side exposed to anyone when I enter it. Changing the passcode also makes that a bit impractical. My fingerprints would be a lot easier to come by. Whether I want to or not, I leave them on smooth surfaces everywhere. And as noted above, I can't change them (practically). |
Quoting HomSar (Reply 15): I'm not going to be camping out in front of the Apple store, but I decided a while ago that I was going to switch to iPhone for my next phone, so I've just been holding off for a while. My biggest hope is that they have a 128 GB model. I have a several year old iPod touch (first one that was available at 64GB), and it's basically full. If they offer a 128 GB iPhone, I'll get that to replace both my old Android and my iPod. |
Quoting DocLightning (Reply 21): Unlike passwords, you can't forget or lose your fingerprints (well, if you do, you have bigger problems). The big vulnerability is that if someone really wanted to, they could collect your fingerprints somehow, create a thin wearable glove with your fingerprints molded on, and then fake out the scanners we have at work. |
Quoting cmf (Reply 27): I'm glad you're perfect. Certainly not representative of how most people enter pin codes. |
Quoting cmf (Reply 27): Suggest that you continue using your perfect pin code but let the rest of the world take a step up by using fingerprints instead of no pin code or easily read pin codes. |
Quoting Revelation (Reply 28): Doesn't seem that hard to do, given that 3d printer technology is out there. The benefit is it can be done without your knowledge and a lot quicker than iterating through 10,000 numbers. |
Quoting Klaus (Reply 30): It can be better than no security at all, but that's not saying much. Particularly since pretty good security is so easy to get. |
Quoting Klaus (Reply 30): When the device erases itself after 10 unsuccessful attempts, that's not even a real option. |
Quoting cmf (Reply 32): No, it is much better than the poor security you propose because it is practical. |
Quoting rwy04lga (Reply 34): The problem with that is someone could possibly erase all of your info on purpose. A rival, an angry girlfriend, a mean older brother....any of those people could easily ruin your day. |
Quoting Klaus (Reply 35): So is a passcode. |
Quoting Klaus (Reply 35): If you don't have any data worth protecting with a passcode |
Quoting Klaus (Reply 35): a fingerprint sensor can still provide a little protection |
Quoting Klaus (Reply 35): not least because to be really convenient it must be calibrated towards false positives rather than false negatives. |
Quoting Klaus (Reply 35): I expect the first "fingerprint crack" within the week. |
Quoting Klaus (Reply 26): How do you "read" my passcode? I take care to not have the display side exposed to anyone when I enter it. Changing the passcode also makes that a bit impractical. My fingerprints would be a lot easier to come by. Whether I want to or not, I leave them on smooth surfaces everywhere. And as noted above, I can't change them (practically). |
Quoting cmf (Reply 36): What phone out there are not worth protecting? The only I can think of are the phone that are receive only calls or those only able to dial preset numbers. Looking forward to see what you come up with. |
Quoting cmf (Reply 36): Again, this shows you don't understand what we are trying to protect. This is for opportunistic situation. |
Quoting cmf (Reply 36): The pin code crack is already here. |
Quoting ManuCH (Reply 37): So I don't see how this can't be a huge step forward. |
Quoting Klaus (Reply 38): Ask the people who don't protect their phones – not me. |
Quoting Klaus (Reply 38): See my posts above. |
Quoting Klaus (Reply 38): Nope. It isn't. Whoever told you that didn't know what they're talking about. |
Quoting Klaus (Reply 38): A thief has no realistic chance of cracking a passcode on a semi-recent iOS device |
Quoting Klaus (Reply 38): Even Apple themselves can only unwrap the outer encryption layer through their private code-signing key, not the inner ones |
Quoting Klaus (Reply 38): Using a nontrivial passcode makes it pretty much impossible to get at the data on the device for all that is known at this point. |
Quoting Klaus (Reply 39): Replicating fingerprints is not difficult. |
Quoting cmf (Reply 40): No, it is you who insist fingerprint isn't enough. back to you, where isn't fingerprint enough? |
Quoting cmf (Reply 40): I've seen your posts. You have dug yourself a hole from where you refuse to look out. Security isn't about making everything perfectly safe. In fact, it hardly ever is about making it perfectly safe. Security is about making it difficult enough that it isn't worthwhile. |
Quoting cmf (Reply 40):
remember the thread where you stated you never attack other people? Another example of you failing to live up to your claims. |
Quoting cmf (Reply 40): Problem for you is that I do know what I'm talking about. Even worse is that I'm talking about the most basic form of cracking there is and something mentioned above. All it takes is an eye and looking at the device when someone enters the code. As mentioned above it works with just about everyone and requires much less effort that lifting a fingerprint and making it readable. |
Quoting cmf (Reply 40): Wrong. It takes them time but they can reduce it to a point where it is a realistic projects. It is a service they provide. |
Quoting cmf (Reply 40): Have you tried it? It is not nearly as simple as you think. depending on the technology used in the scanner it ranges from a lot of tries the first times to damn near impossible. |
Quoting cmf (Reply 32): Sadly too many security experts are so concerned about that once in a billion situation instead of the everyday situation that they create very unsecure systems. |
Quoting ManuCH (Reply 37): I think the fingerprint scanner (if the next iPhone really gets that, if the rumors are true) is a huge step forward in security. I check my iPhone quite often, and I'm annoyed by having to type the code every time. Therefore I set it to be enabled only after 15 minutes of inactivity. This means my iPhone is *very* insecure for 15 minutes after each time I've used it. I dislike that, but it's a trade-off I took to work against the annoyance of entering the code over and over. |
Quoting cmf (Reply 32): The real problem with biometric security is when the system fails and no-one remembers the password backup because it hasn't been used in the last 2 - 3 years. |
Quoting Klaus (Reply 39): As I said: It's a step forward for people who hadn't secured their iPhone at all so far. |
Quoting Klaus (Reply 39): Replicating fingerprints is not difficult. There are easy do-it-yourself instructions on the internet. |
Quoting ManuCH (Reply 43): How easy really? How much of an effort is required? |
Quoting ManuCH (Reply 43): Also, how do you know whose prints you need? Any surface is likely to have many prints of several different people. |
Quoting ManuCH (Reply 43): This means that inside a "circle of trust" (close friends, family members) the fingerprint sensor is a step forward. |
Quoting ManuCH (Reply 43): It would be much harder to unlock, say, your partner's phone (leaving aside the fact that if you do that, your relationship probably has other issues   ![]() |
Quoting ManuCH (Reply 43): To sum it up: I'll definitely enable that feature, if it is introduced, and my phone will be safer than now, because it will need some kind of security *every* time I unlock it. And I will never use my PIN, so nobody else looking over my shoulder would know it. This means that if I leave my phone unattended (which I rarely do, but still) the casual observer will not be able to unlock it. |
Quoting Klaus (Reply 39): Replicating fingerprints is not difficult. |
Quoting DocLightning (Reply 45): |
Quoting Klaus (Reply 41): On my device with my data. |
Quoting Klaus (Reply 41): And leaving copies of the key to my data everywhere I touch any smooth surface is not my idea of data security |
Quoting Klaus (Reply 41): I've nowhere stated that everybody had to agree with me. It's just my own position. |
Quoting Klaus (Reply 41): There is absolutely zero personal attack on you in my statement above. You may not happen to like what I have to say, but that is a completely different thing. |
Quoting Klaus (Reply 41): I don't even let friends look at the display and my fingers when I enter the passcode, much less potential thieves. |
Quoting Klaus (Reply 41): Sorry, but you're still wrong there. |
Quoting Klaus (Reply 41): With a simple 4-digit passcode this already takes many hours (which is part of the design); With a nontrivial passcode it is just not feasible even then since it would take years or decades. |
Quoting Klaus (Reply 41): I didn't need to (nor do I have any such incentive). There are people who make it their hobby to circumvent locks of all kinds and other people who investigate security issues. |
Quoting Klaus (Reply 44): Pretty quick and easy with readily available means |
Quoting Klaus (Reply 44): but we'll see how long the presumable sensor in the 5S will remain a barrier there. |
Quoting Klaus (Reply 44): On your phone a thief already has in their hands, most likely there will only be your own. |
Quoting Klaus (Reply 44): This is not a falsifiable claim with a fingerprint sensor which always just has a statistical response, but a passcode will never accidentally unlock a device, so intent is definite and undeniable. |
Quoting Klaus (Reply 44): I've never denied that it can be a viable option if you accept the consequences. But it's not for me. |
Quoting DocLightning (Reply 45): but it requires some specialized equipment and a fair amount of effort. |
Quoting DocLightning (Reply 45): Obsession with security can be counter-productive, too. |
Quoting cmf (Reply 47): That's not an answer. You need to tell what type of data is unsecure with fingerprint but safe with pin code. All your answer provide is that you have classified some type of data you have as being in that range so it should be easy for you to provide a real answer. |
Quoting cmf (Reply 47): You need to look at the effort it takes. |
Quoting cmf (Reply 47): It is a pretty safe bet Apple would not use that kind of technology since even 10 years ago when we manufactured scanners it was easy to implement features raising the bar. |
Quoting cmf (Reply 47): Look back at your posts. This isn't what you state. You're stating fingerprints is a bad idea, that people should use pin codes instead. |
Quoting cmf (Reply 47): You stated I do not know what I'm talking about, as It was my claim. |
Quoting cmf (Reply 47): You did not provide any support for why my statement was wrong, only an attack on my knowledge. Then add that the method for cracking open a pin code protected iPhone had already been posted and your claim is even more ridiculous. |
Quoting cmf (Reply 47): The data we got back indicate differently... |
Quoting cmf (Reply 47): We got the data in a week. It took a lot of time getting it setup but it was very fast once they got the device. |
Quoting cmf (Reply 47): You must be an extreme outlier because everyone I know slip from time to time. Reality is that most people enter pin codes so it is easy see what it is. |
Quoting cmf (Reply 47): What is preventing locking the phone after x number of failed attempts at reading a fingerprint? It is afterall what you rely on to prevent brute force pin code crack. We have already addressed that it is much easier to lift a pin code than it is to create a workable fingerprint, as most people use them. |
Quoting cmf (Reply 47): This got me laughing If you did this to me I'd just tell you to unlock it again... You will fail and then we will have the same discussion as if you lifted my pin code. |
Quoting cmf (Reply 47): I have to accept the consequences of using pin code too. Reality is that with fingerprint I am just about every other person is safer than with pin code because the people around me are much more likely to get my pin code than they are to be able and ready to make a fingerprint substitute. In all other situations there really isn't a difference in risk as those people will do the same if I use pin code or fingerprint. |
Quoting cmf (Reply 47): There you have the sum of the pin code or fingerprint argument in the real world. Not the outlier situations you seem so concerned about. |
Quoting Klaus (Reply 48): Nope. Unless a passcode is set in addition to the fingerprint, the fingerprint sensor response will always just be statistical. The claim that it "just unlocked" via fingerprint is not falsifiable unless you've got access to internal system logs. |
Quoting Klaus (Reply 48): Somebody trying to crack your device is already an "outlier" situation in itself. We're not discussing standard situations either way. |