The Latest in IT Security

Apple Touch ID design constraint raises authentication red flags

11
May
2015
Apple Touch ID design constraint raises authentication red flags

appletouchid

A design constraint of limits its applicability to authorised actions on a device. Here’s what app developers and end users need to know.

‘s Touch ID recognises fingerprints and tells you whether the fingerprint on the sensor has been registered. Every fingerprint authorised on a device is equivalent; this is an important design constraint to remember for anyone designing a security mechanism that depends on Touch ID.

Read More

Leave a reply


Categories

FRIDAY, AUGUST 23, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks