Tag Archive for Huawei

Fake Fingerprints Can Open Your Phone

– Updated 03-30-2016 – The Business Insider proves that you can use Play-Doh to fool the fingerprint sensor in your Phone.

Fake Fingerprints Open GalaxyI have pointed out a number of times that biometrics will not be the complete final solution for passwords. Biometrics is the measurement and statistical analysis of people’s physical and behavioral characteristics. The technology is mainly used for identification and access control. The basic premise of biometric authentication is that everyone is unique. An individual can be identified by his or her intrinsic physical or behavioral traits.

Fake Fingerprints Can Open Your PhoneThere is a huge issue with biometrics.  You can’t change your intrinsic physical or behavioral traits if they get stolen or hacked. Well, now there is more proof that biometrics can be hacked without cutting off a finger.

Hack mobile phone authentication

Two smarty Sparty’s from Michigan State University’s biometrics group has figured out a way to hack mobile phone fingerprint authentication. According to Help Net Security, the MSU researchers can hack your secure phone by using just a scanner, a color inkjet printer, a special type of paper, and ink.

AgIC silver conductive ink cartridgesTurns out that the attack is easy to execute. The first step is to scan the target’s fingerprint image at 300 dpi or higher resolution. Then, the image is mirrored and the original or binarized fingerprint image is printed on the glossy side of an AgIC special paper. The printer uses AgIC silver conductive ink cartridges (along with normal black ink).

Magical conductive ink

CrunchBase explains that advances in material science have made it possible to manufacture almost magical conductive ink. AgIC silver conductive ink has tiny silver particles and can be purchased online. The ink is printed by standard Brother printers. The ink dries in a few seconds and conductivity emerges instantly when the traces are drawn on special photo inkjet printing paper also available online.

spoofed fingerprintAll in all, an attacker can have a spoofed fingerprint that would allow him to access a phone protected with fingerprint authentication in less than 15 minutes, and the cost of all the tools he needs to do this does not surpass $500.

Researchers Kai Cao and Anil Jain successfully managed to fool the fingerprint sensors on the Samsung (005930) Galaxy S6 and Huawei (002502) Hornor 7 phones.

They posted a demo of the attack on YouTube:

 

The attack is an improvement over Germany’s Chaos Computer Club’s attack against Apple (AAPL) Touch ID on iPhone 5S by lifting a fingerprint of the genuine user of a glass surface and then making a spoof fingerprint. More details about the Michigan State researchers’ work can be found here (PDF).

Only a matter of time

Starbucks app hackedThe Sparty researchers note that not all mobile phones can be hacked using this method. But their experiment is proof of the urgent need for anti-spoofing techniques for fingerprint recognition systems, especially for mobile devices which are being increasingly used as a part of two-factor authentication for site access and payment processing like Apple Pay, Google (GOOG) Pay, or Samsung Pay.

The researchers warn that it is only a matter of time before hackers develop improved hacking strategies not just for fingerprints, but other biometric traits that are being adopted for mobile phones (e.g., face, iris, and voice).

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wi-Fi Marches On

Wi-Fi Marches OnKevin Fitchard at GigaOm lays out where Wi-Fi is headed. Now that the second wave of 802.11ac Wi-Fi equipment is hitting the market, new pans are happening. The Wi-Fi Alliance and the Institute of Electrical and Electronics Engineers (IEEE) have begun to look ahead to 802.11ac successor. This time around, the wireless industry is turning its focus away from overall network capacity to real connection speed to the device.

IEEE logoMr. Fitchard explains that the huge gigabit-plus numbers often attributed to 802.11ac can be a bit misleading. They represent the overall capacity a Wi-Fi network can support. For instance, 1.3 Gbps in today’s most advanced routers, but only in the rarest of circumstances would any single device actually be able to connect at such high rates. The author argues that 802.11ac technologies improvements will be able to pack more high-speed connections into a single router and take advantage of bigger swaths of unlicensed spectrum.

Fair share

However, individual connections are still peaking at just over 300 Mbps. Assuming the broadband connection that can even support those speeds. Typical connection speeds are far slower. 802.11ac channel widthWith 802.11ax, though, wireless engineers are making sure the individual, not just the network, gets its fair share of attention, said Greg Ennis, VP of Technology for the Wi-Fi Alliance.

Wi-Fi Alliance logoThough the IEEE is still in the early stages of developing the 801.11ax specifications (we likely won’t have a ratified standard until at least 2018), it has begun setting priorities for the new technology, the Wi-Fi Alliance’s Ennis said. And at the top of that list is a 4X increase in speed to the device, possibly pushing individual device connections into the gigabit range.

MIMO-OFDA

GigaOm speculates that the IEEE is hoping to do this with a new radio technology called MIMO-OFDA. MIMO, or multiple input-multiple output, uses multiple antennas to send multiple streams of data to the same or different devices, while OFDA is a variant of the orthogonal frequency division multiplexing (OFDM) technologies used in 4G mobile and earlier Wi-Fi standards. The idea is to create a more powerful and efficient radio that can shove more bits into the same transmission. That would create a bigger data pipe to the individual devices, which would, in turn, add up to greater overall network capacity and better Wi-Fi performance even in the sketchiest of conditions, Mr. Ennis said. “The goal here is not just to increase average throughput, but the average throughput users would actually see in the real world, even in the densest environments,” Ennis said.

 IEEE 802.11axChinese equipment maker Huawei (002502) — which is heading up the IEEE 802.11ax working group — is already doing trials of MIMO-OFDA systems and it’s hitting 10.53 Gbps in the lab using Wi-Fi’s traditional 5 GHz band. Whether that means a 10 Gbps to your smartphone or tablet remains to be seen, but it hardly seems relevant given it’s difficult to comprehend what any device could possibly do with a 10 Gbps connection (much less a home broadband connection capable of supporting a high-capacity link).

 

IEEE 802.11ah

Faster simultaneous Wi-Fi connections

But if 802.11ax lives up to its promise, the author says it should be able to squeeze a lot more and a lot faster simultaneous connections out of a single router or hotspot, which would mean a far better experience for everyone on a crowded network. Though the IEEE won’t ratify 802.11ax until 2018 or later, we might see the Wi-Fi Alliance certify “draft-ax” devices and equipment beforehand just as we saw “draft-n” and “draft-ac” devices before their respective 802.11 standards were finalized. It all depends on how far the wireless industry has progressed with the underlying technology in the coming years, Ennis said. A range comparison for different Wi-Fi technologies. And long before we see the “ax” suffix stamped onto any gadget or router, other combinations of the Wi-Fi alphabet will make an appearance.

The Alliance will begin certifying the first 802.11ad, or WiGig, devices next year, supporting extremely close range but very high-capacity links between gadgets and peripherals. A bit further down the road is 802.11ah, which will take Wi-Fi to the 900 MHz band where it will provide narrowband but long-range connectivity to the internet of things.

rb-

Techie wireless alphabet  – IEEE, N, AC, AD, AH, AX, MIMO, OFDM, EI, EIO, O!

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tech Giant Lobbying

Tech Giant LobbyingIn honor of election day, here is some unsettling info from IDG. The research firm reports that 2013 was a record year for computer and internet company spending on lobbying in the U.S., and 2014 is looking set to continue that trend. They presented an infographic that tracks information technology firms’ money spent buying, corrupting, lobbying politicians.

record year for computer and internet company spending on lobbying in the U.S.The article says that advertising, privacy, cybersecurity, patents & IP, tax, immigration, energy, drones, and mobile payments are all issues the tech industry wants to control, dominate influence on Capitol Hill. IDG’s research says that Google was the biggest spender; the search giant spent $3.94M in Q3, an increase from this time last year.

IDG reports that many well-known tech firms have increased their political spending when compared to last year. They report that social networking giant Facebook (FB) has already surpassed its lobbying spend compared to all of last year. Other tech mega-firms that have increased their attempts to buy political power lobbying include:

tech mega-firms have increased their lobbyingMicrosoft (MSFT), historically one of the biggest spenders in this area, was one of the few companies to actually decrease its spending from this time last year, down by a quarter to $1.66M according to the report. It seems a lot of the other legacy enterprise companies are also cutting back. Other companies reducing lobbying spend compared to this time last year are:

Don’t worry about the fat-cats, IDG says there are plenty of other companies also lining politicians pockets spending +/- $1M each on lobbying including the likes of:

2014 Tecch Lobby Spending - IDG

rb-

No wonder Washington is broken, how much of this money goes into the stupid TV ads you can’t escape. Maybe if these firms paid their proper taxes they would not have so much cash to spend buying congress. Oh right – IBM is a person who has rights.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Bach Seat Under Attack from China

Sean Buckley at FireceTelecom reports that China Telecom is setting its sites on the U.S. market. He is reporting that China Telecom announced plans to expand its global business unit. The move will drive $1.6 billion (CNY 10 billion) of sales in 2013.

Wang Xiaochu, China Telecom’s chairman, said in a China Daily report that the service provider saw the potential for its international business, after developing its China Telecom Global division. They plan to target including Asia-Pacific, Europe, and the Americas.  The article states that the service provider said it will aggressively purchase international assets to expand its presence in the U.S. “It is for sure that China Telecom will conduct M&As globally, and we are training talent to be more well-prepared,” said Wang.

China Telecom Americas

China Telecom Americas (CHA) is the largest international subsidiary of State-run China Telecom. CHA has launched its self-branded retail mobile service in Chicago. Donald Tan, president of CHA said the service will expand to Los Angeles and New York soon. In addition, the Chinese service provider has opened an office in Chicago.

However, one analyst says that given the recent government opposition to Chinese-based companies Huawei and ZTE (783), China Telecom could face similar challenges in serving the U.S. market in a significant way.

Given the failure of Huawei Technologies Co. Ltd. and ZTE Corp. in their attempts to gain a foothold in the U.S. market, I am not optimistic that China Telecom, a truly State-owned Chinese company, will do any better,” said Xiang Ligang, a Beijing-based telecommunications expert who also runs the industry information website cctime.com.

China Telecom, the State-owned Chinese service provider owns and operates CHINANET (China’s largest Internet network). This may be why U.S. regulators will try to squash CHA’s growth. My personal experience says that China Telecom does not control its networks very well.

For the last several months, this blog has seen a huge uptick in attacks. The attacks were primarily from China Telecom-controlled IP subnets. So far they have been defended off by the smart use of good software. For the past 10 weeks, there has been a peak of 87 attack attempts and an average of 27 attacks per day from China Telcom-controlled subnets. The attacks originated from the Anhui, Jiangsu, and Shanghai provinces. Over this time the most attacks came from China Telecom’s CHINANET locations ib:

 

Attacking IP addresses

Akami (AKAM) claims that China is the source of most cyber-attacks in its latest State of the Internet report. The Content Distribution Network (CDN) reports that about 33% of attack traffic originated in China between July and September 2012. Akamai also reports China has been the top source of attack activity since the end of 2011.

CHINANET claims to be the world’s largest Internet network

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Brocade Selling Itself

Brocade Selling ItselfChannelInsider citing the Wall Street Journal is reporting that network equipment maker Brocade Communications Systems Inc. put itself up for sale on 10-05-09. The paper, citing people familiar with the matter, said Oracle and Hewlett-Packard were potential bidders for the company, but a deal was not imminent and Brocade may not even go ahead with a sale. Oracle CEO Larry Ellison told investors at Oracle’s annual shareholder conference Wednesday. “We have no interest in buying Brocade,” in response to a question from an investor according to Fortune.

Data centerTo compete with much bigger rival Cisco Systems Inc, the company has been bolstering sales partnerships with large technology vendors such as IBM and Dell to expand their customer reach. In an interview with Reuters last month, Brocade Chief Executive Michael Klayko had said he did not see a need for Brocade to merge with or acquire another company, citing the company’s expertise and partnerships.

However, Goldman Sachs analyst Min Park told Fortune, interest in Brocade is picking up, “Brocade is a likely strategic fit for a number of potential acquirers.” He includes Hewlett Packard, Juniper, Dell, IBM, and Oracle among those interested in Brocade.

rb-

It is unlikely that Dell will purchase Brocade since Dell has Perot Systems to digest and a sales partnership with Brocade. Juniper is not in the financial position but is the most need of the product. IBM is financially capable but the hardware business seems to be losing focus at Big Blue. That leaves HP  for three reasons, first, it is financially capable, second, it is looking to grow its ProCurve business and its EDS acquisition is well underway. The wild card could be Huawei if they can get government approval. Of course, Brocade CEO Mike Klayko just may have needed some extra pocket money as the Wall Street Journal article triggering a 14 percent jump in the company’s shares. Mr. Klayko’s $5 million in options increased by $700,000 in one day.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.