Security Research for Cryptocurrency Investors from China: iOS or Android?
Chinese researchers examined whether cryptocurrency users should use Android or iOS. A detailed review recently shared by Chinese tech researchers has caused unease. Suggesting that almost all Android phones with fingerprint protection can be unlocked with a brute force method called “BrutePrint”, the researchers emphasized that iPhone products may be safer for crypto money investors. While security is a critical priority for cryptocurrency users, potential weaknesses can result in huge losses. In the presented research, a kind of technical hacking method was featured. This attack refers to a strategy that eventually correctly guesses the fingerprint of the target device and presents this prediction continuously. Attackers can implement this type of attack using the system's concept of False Accept Rate (FAR). In the research, two vulnerabilities called “Cancel After Match Fail (CAMF)” and “Match After Lock (MAL)” were discovered and how these vulnerabilities could be exploited to perform a fingerprint-driven brute-force attack. #GateioTurns10 #BountyCreator #ContentStar #GateioBountyCreator #Gateio10周年 #NewYearCelebration #CryptoObserves #币CircleObserver #NewsMessenger
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Security Research for Cryptocurrency Investors from China: iOS or Android?
Chinese researchers examined whether cryptocurrency users should use Android or iOS.
A detailed review recently shared by Chinese tech researchers has caused unease. Suggesting that almost all Android phones with fingerprint protection can be unlocked with a brute force method called “BrutePrint”, the researchers emphasized that iPhone products may be safer for crypto money investors.
While security is a critical priority for cryptocurrency users, potential weaknesses can result in huge losses.
In the presented research, a kind of technical hacking method was featured. This attack refers to a strategy that eventually correctly guesses the fingerprint of the target device and presents this prediction continuously. Attackers can implement this type of attack using the system's concept of False Accept Rate (FAR).
In the research, two vulnerabilities called “Cancel After Match Fail (CAMF)” and “Match After Lock (MAL)” were discovered and how these vulnerabilities could be exploited to perform a fingerprint-driven brute-force attack.
#GateioTurns10 #BountyCreator #ContentStar #GateioBountyCreator #Gateio10周年 #NewYearCelebration #CryptoObserves #币CircleObserver #NewsMessenger