Lansarea Touch ID(cititor de amprente) pentru iPhone 5S a dat startul unor discutii interminabile in legatura cu nivelul de securitate pe care il poate oferi acest sistem. Apple a explicat foarte clar de la bun inceput ca toate informatiile din Touch ID sunt stocate intr-un chip enclava amplasat in interiorul chip-ului A7, el neputand fi accesat chiar daca o persoana exploateaza noul procesor de 64 de biti al iPhone 5S. Pentru a demonstra ca masurile de securitate ale celor de la Apple sunt si mai complexe decat a explicat compania, un website american a decis sa mute cititoarele de amprente a doua terminale iPhone 5S intre ele pentru a vedea daca acestea sunt inregistrate de catre terminal.
It’s hard to say why Apple might lock the A7 chip to a specific Touch ID sensor. One possibility could be to try and prevent any sort of sniffing or interception taking place between the Touch ID sensor and the secure enclave. Sort of like a hardware equivalent to SSL certificate pinning. By pairing the A7 chip to a specific Touch ID, this could make it more difficult for tinkerers to try and intercept communications to reverse engineer how the components talk to each other.
Surpriza a constat in faptul ca, chip-urile A7 nu recunoasteau decat cititorul de amprente cu care au fost livrate din fabrica, afisand erori de recunoastere a unui cititor din alt iPhone 5S. Acest lucru demonstreaza faptul ca Apple a conceput sistemul intr-un asa fel incat in cazul desfacerii unui iPhone si a inlocuirii cititorului de amprente, terminalul sa refuze sa recunoasca noua componenta. Implementarea acestei masuri nu face altceva decat sa creasca si mai mult nivelul de securitate al Touch ID
, deoarece un hot/hacker nu va putea exploata sistemul.This could also mitigate possible risks of malicious third-party Touch IDs being installed in a user’s device without their knowledge which could capture a user’s fingerprint for an attacker, while passing it on to the A7 chip to allow a user to continue to use their device as normal, without any indication it has been tampered with. If Apple instead used some sort of shared key that was used by all Touch ID sensors to authenticate with the A7 chip, it would only take one Touch ID’s key being hacked to compromise all of them. Being tied to a unique Touch ID sensor on each phone means installing something like a malicious Touch ID sensor would require cracking each device you want to attack individually.
Chiar daca sistemul Touch ID poate fi pacalit folosind o amprenta din latex scanata si “furata” de la utilizator, sansele ca aceasta procedura sa fie aplicata pe un terminal furat sunt mici. Deocamdata nimeni nu a reusit sa sparga Touch ID-ul celor de la Apple, unii incearca de mai bine de o luna de zile si probabil vor avea mai mult succes abia dupa ce iPhone 5S va fi jailbroken folosind solutia de untethered jailbreak pentru iOS 7 care este dezvoltata in momentul de fata.
This post was last modified on nov. 1, 2013, 9:05 AM 09:05