ChaosComputerClub

Latest

  • Chaos Computer Club

    The Galaxy S8 iris scanner can be hacked with aging tech

    by 
    Chris Ip
    Chris Ip
    05.23.2017

    Biometrics are becoming our next de facto security measure, and they're supposed to be a vast improvement on easily-forgotten and hackable passwords. Yet a point-and-shoot camera, laser printer and contact lens is all it took for German hacking group Chaos Computer Club to crack the Samsung Galaxy S8's iris scanner. "By far [the] most expensive part of the iris biometry hack was the purchase of the Galaxy S8," the group wrote on its website. They pulled it off by taking a photo of the target from about five meters away, and printing a close-up of the eye on a laser printer — made by Samsung, no less. A regular contact lens was placed on top of the print to replicate the curve of an eyeball. When the print was held up to the smartphone, the S8 unlocked.

  • You only need a camera (and luck) to copy someone's fingerprints

    by 
    Jon Fingas
    Jon Fingas
    12.29.2014

    Forget having to lift smudges from a touchscreen to copy someone's fingerprints. According to a Chaos Computer Club presentation, you only need a camera... well, that and a little luck. The hacking association's Jan Krissler recently demonstrated that you can reproduce someone's fingerprint by getting a few good photos of their hand and processing it through off-the-shelf authentication software like VeriFinger. In Kessler's case, he got the German Defense Minister's thumbprint through photos from a press conference.

  • Chaos Computer Club says it's beaten Apple's Touch ID fingerprint reader (video)

    by 
    Richard Lawler
    Richard Lawler
    09.22.2013

    Already feeling secure about using just your fingerprint to unlock the new iPhone 5S? European hacker association Chaos Computer Club claims it can be circumvented with "easy everyday means." According to CCC hacker "Starbug", tactics laid out in a how-to from 2004 are all that are required, with just a higher res fake needed to beat the Touch ID reader. The process, requires a 2400 DPI photograph of someone's fingerprint from a glass surface, which is then laser printed at 1200 DPI and used to create a thin latex sheet that serves as the fake. Simple, right? It's a bit more labor intensive than the old way (just watching someone input their passcode or pattern) but users may want to consider fingerprint access as a measure intended more for convenience than security. [Thanks, Frederic]

  • Hackers obtain PS3 private cryptography key due to epic programming fail? (update)

    by 
    Sean Hollister
    Sean Hollister
    12.29.2010

    The 27th annual Chaos Communication Conference already hacked encrypted GSM calls with a $15 cellphone, but there was a second surprise in store this morn -- the souls who unlocked the Nintendo Wii's homebrew potential (and defended it time and again) claim to have broken into the PlayStation 3 as well. Last we left the black monolith, Sony had won a round, forcing the community to downgrade their firmware for any hope at hacking into the console. Well, the newly formed fail0verflow hacking squad says that won't be a problem any longer, because they've found a way to get the PS3 to reveal its own private cryptography key -- the magic password that could let the community sign its very own code. So far, the team hasn't provided any proof that the deed's been done, but they have provided quite an extensive explanation of how they managed the feat: apparently, Sony didn't bother generating any random numbers to secure the blasted thing. (We don't really know how it works, but we have it on good authority that dead cryptography professors are rapidly spinning in their graves.) The group intends to generate a proof-of-concept video tomorrow, and release the tools sometime next month, which they claim should eventually enable the installation of Linux on every PS3 ever sold. Catch the whole presentation after the break in video form, or skip to 33:00 for the good stuff. Update: The proof-of-concept vid is a bit underwhelming -- fail0verflow had to SSH into a PS3 over ethernet -- but it's here nonetheless. See it after the break, and find the team's full set of presentation slides at our more coverage link. [Thanks, Paolo S.]

  • Researchers eavesdrop on encrypted GSM call: all you need is a $15 phone and 180 seconds

    by 
    Darren Murph
    Darren Murph
    12.29.2010

    It's hardly a fresh idea -- researchers have claimed that GSM calls could be cracked and listened in on for years. But there's a difference between being able to do something with a $50,000 machine and a warrant, and being able to do the same thing with a few $15 Motorola phones, a laptop, open source software and 180 seconds of spare time. Security Research Labs researcher Karsten Nohl and OsmocomBB project programmer Sylvain Munaut recently spoke about a new GSM hack at the Chaos Communication Conference in Berlin, and they were able to walk the audience through the eavesdropping process in a matter of minutes. According to them, it's not terribly difficult to use a $15 handset to "sniff out" location data used to correctly route calls and texts, and once you've nailed that down, you could use modified firmware to feed raw data into a laptop for decryption. Using a 2TB table of precomputed encryption keys, a cracking program was able to break in within 20 seconds -- after that, you're just moments away from recording a live GSM call between two phones. Of course, speeches like these are made to encourage security officials to beef up the layers between you and ill-willed individuals, but it's hard to say what (if anything) will change. For now, we'd recommend just flying to each and every person you'd like to speak with. Unless you live in the Greater New York area -- you're probably better off risking a hacked conversation than heading out to LGA / JFK / EWR.

  • CCC's "Freedom Stick" circumvents China's firewall, just in time for The Games

    by 
    Paul Miller
    Paul Miller
    08.08.2008

    Rumor has it that a large quantity of genetically-superior human beings are amassing in Beijing at the moment and attempting to squeeze into spandex-like outfits for your entertainment. Those interested in watching such tight-outfitted goings on are going to find themselves faced with even tighter internet restrictions when they get back to their hotel room or local internet cafe, thanks to that handy dandy Great Firewall of China. Lucky for them, the Chaos Computer Club has prepped a solution called the "Freedom Stick" which when plugged into a computer redirects its internet traffic over The Onion Router, a worldwide network of anonymous computers designed to hide your steps. Naturally, you can just download the software yourself, but the $30 USB dongle could come in handy if you're not on your own PC, or just want to leave behind material evidence of your indiscretion. The Freedom Stick will only be available through the duration of the Olympics, so get one while you can.[Via Wired]