The Latest in IT Security

Apple Touch ID design constraint raises authentication red flags

11
May
2015
Apple Touch ID design constraint raises authentication red flags

appletouchid

A design constraint of limits its applicability to authorised actions on a device. Here’s what app developers and end users need to know.

‘s Touch ID recognises fingerprints and tells you whether the fingerprint on the sensor has been registered. Every fingerprint authorised on a device is equivalent; this is an important design constraint to remember for anyone designing a security mechanism that depends on Touch ID.

Read More

Leave a reply


Categories

TUESDAY, OCTOBER 24, 2017

Featured

Archives

Latest Comments

Social Networks