[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] TouchID and !simple passcodes
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] TouchID and !simple passcodes
- From: Brandon Perry <bperry.volatile@xxxxxxxxx>
- Date: Sat, 30 Nov 2013 22:41:53 -0600
So, playing around with my new handy-dandy iPhone 5s, enabled a strong
passcode > 20 characters long.
I notice however, if I use TouchID to login while on the passcode screen
(slide over to it after unlocking, then log in with TouchID), ~10
characters are entered into the passcode text box before I am logged in.
Has anyone ever researched this behaviour? I have heard arguments that
it is simply a cosmetic feature with random text or something, but that
really makes no sense to me.
My main concern is if this short little string that I have no control
over can also unlock my phone, it will be bruteforced before my actual
passcode (couldn't care less about the iphone personally, a toy). That
would mean TouchID is actually making my phone less secure under the
guise of being more secure (gasp!). Not saying this is some Apple
backdoor, could just be a design flaw.
Also, if it is a hash of some kind limited to a-f0-9, that greatly
decreases the space needed to bruteforce a string this length. :/ But
that is wild ass speculation.
I am not being too conspiratorial, as I just find it very curious
behaviour and don't find something like that being just cosmetic
realistic. Totally willing to eat crow though.
Any thoughts?
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/