Wouldn’t biometric data be sensor/implementation specific. I doubt the fingerprint data stored on an iPhone is the same as the one stored on an Xperia.
That’s the thing - it’s not possible. The fingerprint is only ever stored within the fingerprint module, with no method for retrieval. The only thing the phone sees is “did this person scan a matching fingerprint or not?”
in the early 2000s when fingerprint readers started getting popular, my coworker and I decided to test them…
super glue fumes, printer toner and scotch tape. that’s all that was ever needed to bypass the reader once you could isolate a good spot where someones finger left a good mark. like from drinking glass or a door knob
I’m not sure if I’d ever trust a fingerprint to fully be a secure passkey
Yeah, but what would you do with it? Can you convert the bytes to work on any other sensor the victim may also use their fingerprint? Never looked into the real implementation details of the fingerprint hardware.
Wouldn’t biometric data be sensor/implementation specific. I doubt the fingerprint data stored on an iPhone is the same as the one stored on an Xperia.
Your fingerprint is your fingerprint. If its possible to extract the raw data, then that can be reconstructed into your fingerprint…
That’s the thing - it’s not possible. The fingerprint is only ever stored within the fingerprint module, with no method for retrieval. The only thing the phone sees is “did this person scan a matching fingerprint or not?”
in the early 2000s when fingerprint readers started getting popular, my coworker and I decided to test them…
super glue fumes, printer toner and scotch tape. that’s all that was ever needed to bypass the reader once you could isolate a good spot where someones finger left a good mark. like from drinking glass or a door knob
I’m not sure if I’d ever trust a fingerprint to fully be a secure passkey
I don’t think that means it cannot be leaked
Yeah, but what would you do with it? Can you convert the bytes to work on any other sensor the victim may also use their fingerprint? Never looked into the real implementation details of the fingerprint hardware.
Sometimes you can. Or just bruteforce a colliding pattern that matches to print that instead, because why not