From: Mark McIntyre on
Jeff Liebermann wrote:
> On Sun, 07 Dec 2008 00:06:09 +0000, Mark McIntyre
> <markmcintyre(a)TROUSERSspamcop.net> wrote:
>
(of fingerprint readers)

>> too easy to sniff,
>
> How so? The swipe type readers are inside the laptop.

Most of these doodads seem to be a USB interface internally. A lot of
the ones for desktop PCs are built into the keyboard or are on a
separate USB dongle.

> What did work quite well was an external reader. It was plugged into
> a USB port and most certainly can be tapped and sniffed.

indeed :-)

>> foolable by a variety of creative methods not
>> including severing digits, and not hooked into the OS at a low enough
>> level to properly secure the login.
>
> Other than using the software, I have no experience with how it works.
> I'll plead ignorance here.

There was an article on (I think) The Register about 12 months ago,
where they showed how to use a condom filled with warm dough to lift and
then replay a fingerprint. Highly inventive and surprisingly effective.

From: John Navas on
On Mon, 08 Dec 2008 23:12:49 +0000, Mark McIntyre
<markmcintyre(a)TROUSERSspamcop.net> wrote in
<0Sh%k.397328$vK2.199045(a)en-nntp-03.dc1.easynews.com>:

>Jeff Liebermann wrote:
>> On Sun, 07 Dec 2008 00:06:09 +0000, Mark McIntyre
>> <markmcintyre(a)TROUSERSspamcop.net> wrote:
>>
>(of fingerprint readers)
>
>>> too easy to sniff,
>>
>> How so? The swipe type readers are inside the laptop.
>
>Most of these doodads seem to be a USB interface internally. A lot of
>the ones for desktop PCs are built into the keyboard or are on a
>separate USB dongle.

Correct, but the laptop ones are physically secure, and the
Lenovo/AuthenTec USB devices are securely encrypted with AES, with
patterns are stored on the chip itself, not transferred.
<http://www.authentec.com/products-pcsandperipherals-aes2810.html>

>> What did work quite well was an external reader. It was plugged into
>> a USB port and most certainly can be tapped and sniffed.
>
>indeed :-)

Nope. Perhaps you're thinking of Microsoft's flawed device:
<http://en.wikipedia.org/wiki/Microsoft_Fingerprint_Reader#Criticisms>

>>> foolable by a variety of creative methods not
>>> including severing digits, and not hooked into the OS at a low enough
>>> level to properly secure the login.
>>
>> Other than using the software, I have no experience with how it works.
>> I'll plead ignorance here.
>
>There was an article on (I think) The Register about 12 months ago,
>where they showed how to use a condom filled with warm dough to lift and
>then replay a fingerprint. Highly inventive and surprisingly effective.

That method only works with a cheap optical scanner.
<http://www.washjeff.edu/users/ahollandminkley/Biometric/index.html>
Won't work with the swiper based on capacitive sensing.
<http://en.wikipedia.org/wiki/Fingerprint_recognition#Capacitance>


All this said, it's really a tempest in a teapot, because in most cases
the hacker won't have access to a clean fingerprint.
--
Best regards, FAQ for Wireless Internet: <http://wireless.navas.us>
John Navas FAQ for Wi-Fi: <http://wireless.navas.us/wiki/Wi-Fi>
Wi-Fi How To: <http://wireless.navas.us/wiki/Wi-Fi_HowTo>
Fixes to Wi-Fi Problems: <http://wireless.navas.us/wiki/Wi-Fi_Fixes>