136
submitted 9 months ago by schizoidman@lemmy.ml to c/technology@lemmy.ml
all 19 comments
sorted by: hot top controversial new old
[-] twinnie@feddit.uk 38 points 9 months ago

It’s device manufacturers that are fucking up, not MS.

[-] aard@kyu.de 29 points 9 months ago

Pretty much everybody pushing fingerprints as a sensible thing for accessing a device is fucking up. It is way too easy to obtain a persons fingerprints suitable for device unlocking without them knowing - and that's ignoring that using fingerprints enables device unlocking with a persons finger against their will.

[-] Saik0Shinigami@lemmy.saik0.com 3 points 9 months ago

It’s device manufacturers that are fucking up, not MS.

...

and Microsoft Surface Pro X all fell victim to fingerprint reader attacks

So... MS is not MS? Is that the logic we're going for now?

[-] CaptObvious@literature.cafe 6 points 9 months ago

No, as stated in the article, it’s the sensor manufacturers that are not properly implementing the security protocol.

[-] Saik0Shinigami@lemmy.saik0.com -2 points 9 months ago

So you think that somehow absolves Microsoft how?

[-] CaptObvious@literature.cafe 4 points 9 months ago

It isn’t MS’s screwup. They didn’t build the sensor.

[-] Pyrozo007@lemmy.dbzer0.com 20 points 9 months ago

Shocked_pickachu_face.jpg

[-] autotldr@lemmings.world 14 points 9 months ago

This is the best summary I could come up with:


Microsoft’s Offensive Research and Security Engineering (MORSE) asked Blackwing Intelligence to evaluate the security of fingerprint sensors, and the researchers provided their findings in a presentation at Microsoft’s BlueHat conference in October.

The team identified popular fingerprint sensors from Goodix, Synaptics, and ELAN as targets for their research, with a newly-published blog post detailing the in-depth process of building a USB device that can perform a man-in-the-middle (MitM) attack.

Blackwing Intelligence researchers reverse engineered both software and hardware, and discovered cryptographic implementation flaws in a custom TLS on the Synaptics sensor.

The complicated process to bypass Windows Hello also involved decoding and reimplementing proprietary protocols.

The researchers found that Microsoft’s SDCP protection wasn’t enabled on two of the three devices they targeted.

Blackwing Intelligence now recommends that OEMs make sure SDCP is enabled and ensure the fingerprint sensor implementation is audited by a qualified expert.


The original article contains 474 words, the summary contains 145 words. Saved 69%. I'm a bot and I'm open source!

[-] sadreality@kbin.social 7 points 9 months ago

This is for your own security!

[-] cheese_greater@lemmy.world 0 points 9 months ago

Because of course it has

this post was submitted on 23 Nov 2023
136 points (97.2% liked)

Technology

34382 readers
274 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS