They manage to circumvent the iris scanner of the Samsung Galaxy S8

There is much talk and talk about the face detector of the new Samsung Galaxy S8 and S8 + but what has not been talked about so much in all this time since the presentation of the Samsung equipment is the iris scanner of the device. This scanner that shows how the most secure method of the smartphone besides the fingerprint sensor, has been hacked. At first we still think this iris scanner is safe and it is not an easy task to circumvent its security, but it is evident that it is possible to do it as demonstrated by a group of German hackers belonging to the group Chaos Computer Club.

There is a member in this group who has successfully unlocked the device. It has the nickname, "Starbug" and this has managed to break the security system of Samsung thanks to three steps without too many hours of work and with relative ease. Evidently more is required than to unlock the device using facial recognition, which is achieved simply by placing a photo in front of the terminal but it is not that complicated to do either ...

The first thing we have to do is a photo of the person who has the iris registered on the device using the night mode of a camera. Later print that iris photo using a printer (as a joke they used a laser from Samsung itself) and then simply place a contact lens over your printed image on paper to fool the device scanner. In this way the device will think that it is registering the owner's iris and will unlock the terminal.

We would love to be able to test this method in person. even though this is a recognized group of hackers. The correct thing in this case would be for Samsung itself to come forward to offer the statement, but the brand itself already said that it was impossible to clone the iris pattern and this was one of the safest systems in the world.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.