The author | pigeons
These days, in the circle of friends, mobile phone + face this hot flood.
On Monday, the day xiaomi released its Note3 face-swiping phone, AI tech base wrote about four ways that face-swiping phones can be easily cracked, and that as face-swiping technology becomes more and more popular, it’s no longer possible to have your own privacy.
Today, taking advantage of this hot spot, battalion commander again from the technical level, to thoroughly analyze the mobile phone brush face this matter.
There are interviews with industry insiders, news from Apple’s launch event, and relevant foreign translations. AI Tech Base is only responsible for laying out viewpoints fairly, not taking sides.
Question 1: What’s behind Apple’s Face ID?
This principle of apple is different from the xiaomi Note3 just released.
Structured light, time of flight (TOF) and binocular vision.
Apple bought the company for $300 million in 2013. The company is the granddaddy of 3D sensors. The company’s core technology is speckle ranging with structured light.
Despite a major technological overhaul, is Apple’s latest face brush really as wacky as it claims, with a one in a million error rate?
Is the error rate really only one in a million?
Many people have complained to AI Tech Base that Apple is going too far, eliminating fingerprint recognition altogether and making it difficult to use.
Question three: Is it really more convenient than fingerprint identification?
Is biometrics really more secure than passwords?
Historically, biometrics have been insecure.
Cameras can be tricked.
Sound can be recorded.
Fingerprints can be deactivated.
And in many countries, including the United States, police can legally force you to use your fingerprint to unlock your phone. So, they can also force you to swipe your face to unlock your phone, whether you want to or not. Of course, with the bad guy, the robber doesn’t care about the details of whether it’s legal or whether you’re willing.
At the same time, biometric identification is cracked from time to time.
In 2007, Matt Damon cracked secure voice and fingerprint biometrics in order to get all the information on Project Black Rose in the Bourne Ultimatum, using a method that best illustrates the problems inherent in biometrics:
Take the more complex iris recognition: with millions of cells in the human retina, each person’s retina is unique. That’s pretty high-end biometrics, isn’t it?
But in May, the latest iris unlock on Samsung’s Galaxy S8 was cracked by some security researchers. They use printers and contact lenses to get information from your iris.
If a hacker gets hold of your iris, if a hacker gets hold of your fingerprint, if a hacker gets hold of your face, with the right methods, they can crack any system that uses that information as a password.
Once hackers get hold of your DNA sequence, as in the Arnold Schwarzenegger movie “Day Six,” it’s not impossible that they can use it to clone another version of you.
In fact, 89 percent of iPhone users only use their fingerprint to access their phone without using a password. However, when your Alipay, wechat Pay and Bitcoin wallet are unlocked with Touch ID, “while sleeping… The money is gone. “It’s just a matter of when it happens.
But by default on iOS, you can read incoming text messages without locking your phone. When you buy an App from the App Store, by default, it requires you to enter a long, complicated password to confirm the purchase. This is a separation of “read” and “write” permissions.
Conversely, using a fingerprint to unlock everything makes it look secure… But how much difference can there be in the logic of “read” and “write” permissions compared to not using passwords everywhere? So let’s wait until Apple figures out the logic…
Plus, if you’ve already given up your fingerprints to avoid the “80 times a day” chore, do you really want to give up your face, too?