Techvocast is supported by its audience like you. When you buy through links on our site, we may earn an affiliate commission. Learn more

Smartphone fingerprint lock can be broken In 20 minutes – Chinese research team claim

author photo By Published in Last updated on

If you're thinking that fingerprint lock will secure your smartphone from physical hacker please rethink this through, we have come to the point where any thing can be bypass, now is the almighty fingerprint lock. This might look awkward but is true—a Chinese security research team claim that your fingerprint smartphone can be unlock in less or more than 20 minutes and I think you should be worry about that, mostly if you are in China.


Fingerprint might not be the prominent way to secure your smartphone, but it is the fastest way to unlock your device for both Android and iOS—this is because fingerprint can be broken using an app a security research team created. Just has the recent case of the Samsung galaxy S10 where the fingerprint was malfunction and your phone can be open by any fingerprint, is it that awesome-no I don't think so, although fingerprint is a good measure for protecting your smartphone.

But before any one can unlock your smartphone with the fingerprint hacking technique, the hackers must get your fingerprint photograph, from a glass or anywhere you touch and follow up the process using an app. Chinese research team have shown how they can bypass the fingerprint scanner. The team shows the fingerprint hacking process at the GeekPwn 2019 conference in Shanghai.



The people who cracked it

Tencent, the company that owned Wechat and other popular apps in China, the team who cracked the system is a part of X-Lab security research team which is under the company Tencent. The process still got me thinking—it all started from a glass, the X-Lab team leader Chen Yu, asked some of the audience to touch a glass–the process begins. And then the fingerprint that was seen on the glass was photographed and the photo was passed through the app the X-Lab team developed, but the physical cloning wasn't revealed to the audience, but the fingerprints clone process was created and then used to unlock the audience (whose fingerprint was seen on the glass) smartphone. This process bypass the three different fingerprint scanning technologies use across the smartphone industry: the capacitive, optical and ultrasonic process used for fingerprint security.

So, after all the hacking process which I don't really care about although I do want to know how it works, for elaboration, but the X-Lab leader didn't mentioned or state how it works, perhaps he told the media that the application that is use for the fingerprint hack could cost  RMB 1000 ($142, £110) and its just one phone to one app. If you are probably thinking weather is going to be sold, I don't know for sure but why did he border to mention the amount, perhaps is going on for sale.

If the application created by research team X-Lab goes on sale, smartphone user might falls victim, except for me, there is no way they are going to come near because I clean everything thing i ever touch from this time onward. The researchers themselves suggested that to limit the risk all users needed to do was clean everything they have touched, but we all know you can't clean everything you touch and this will be hard to adopt.

The fact that you should be cleaning everything you touch is so frustrating, and you should do this if you only have sensitive information on your device. And even if the hacker gets your fingerprint he still need to find a way to get to your phone and please don't allow him so be conscious. Hey don't stop using your fingerprint to secure your smartphone because am still using mind. Its save and quicker but using password is more saver.

Although this is not the first time the fingerprint security system has been bypass the most recently was Samsung confirming that there was a flaw in the fingerprint technology used by the flagship Galaxy S10 and Note 10 that enabled the security to be bypassed.