Android fingerprint scanners fooled by inkjet printer

“Your fingerprint is supposed to be the most secure method of locking your smartphone, but that’s not the case if your device can be easily fooled,” Killian Bell reports for Cult of Android. “Researchers have been able to hack those from Samsung and Huawei using only an inkjet printer and conductive ink.”

“‘Your fingerprint is one of the best passwords in the world,’ said Apple’s Dan Riccio when the company introduced Touch ID, the fingerprint scanner that kickstarted a generation of smartphones with fingerprint scanners, in September 2013,” Bell reports. “That may be the case if you use an iPhone, but it seems other devices aren’t quite as good at keeping the bad guys out.”

Bell reports, “Using fingerprints printed from capacitive ink, researchers at Michigan State University were able to fool those used by Samsung and Huawei.”

Read more in the full article here.

MacDailyNews Take: So, who’s shocked that a half-assed, rush-job, knockoff feature bolted onto a half-assed, rush-job, knockoff operating system is insecure as opposed to Apple’s revolutionary Touch ID and iOS?

If it’s not an iPhone, it’s not an iPhone.

Android fingerprint sensors aren’t as secure as iPhone’s Touch ID – August 10, 2015
Security journalist: Goodbye, Android, hello Apple iPhone! – July 29, 2015
Simple, secure Apple Pay propels mobile payments – January 26, 2015
Prior to Steve Jobs unveiling of Apple’s iPhone, Google’s Android didn’t support touchscreen input – April 14, 2014
Before iPhone, Google’s plan was a Java button phone, Android docs reveal – April 14, 2014
How Google reacted when Steve Jobs revealed the revolutionary iPhone – December 19, 2013
Apple to ITC: Android started at Apple while Andy Rubin worked for us – September 2, 2011

[Thanks to MacDailyNews Readers “Robert” and “macbart” for the heads up.]


  1. Speaking of fingerprint scanners, my 6s activated Apple Pay all by itself in my front jeans pocket today. That’s happened before and it should never be able to happen on its own. I don’t think I am putting the phone into my pocket awake and even if I did that shouldn’t be able to trigger it. Anyone else experience this?

    1. If you come close to a pay terminal, it may activate from sleep. But you have to be close.

      Mine activates when I put it near a pay terminal. Wakes up. Recognizes terminal and is ready for me to pay.
      Works just great.

  2. No problem on my iPhone, since it usually doesn’t work worth a damn. I can rescan several fingers and it will work for a day or two at most, gets sporadic and then quits. I just use a six digit number and avoid the frustration.

    1. I call BS. Touch ID has worked perfectly for me since I got my 6s when it went on sale last fall. You unregistered posters need to up your trolling skills.

      1. You can call bullshit all you want, you stupid porker. It’s my friggin’ phone and I know exactly what the hell it does. Just because you lead a life of harmonious bliss rolling around in mud and eating slop doesn’t mean other people don’t have issues with Apple products. And “unregistered” doesn’t mean squat unless people use their real names; so how about you Arnold?

        1. At least Arnold has a long reputation here at MDN.

          You, anonymous coward who switches nicks at will, will find no respect here. Why even bother posting? For all we know you’re just another paid shill troll for ScamScum. 😛

            1. I think Bugger is actually an Android owner and doesn’t even know it. I know several Android owners who constantly complain about their “iPhones”. They have no clue that they are using inferior Android, they think all smartphones are iPhones.

  3. Speaking of Android security:

    Devastating Vulnerability Affects 66 Percent of Android Phones
    Researchers show off a new attack that can seize control of most Android phones.

    The attack uses the Android accessibility framework, which is designed to help users get the most out of their phones, even if they are visually impaired or have difficulty typing, for example. But under malicious control, Amit explained, the accessibility framework can be used to monitor user activity and take actions without users’ knowledge.

    Normally, activating the accessibility tools requires diving through a series of menus and confirming your choice on several screens. These are powerful tools, and you are warned repeatedly by the operating system that granting access to the framework can expose your personal data. But Skycure is able to circumvent these warnings using a technique called clickjacking.

    This is the first whopping security flaw revelation for March. More to come.

  4. This is the Telstra internet support service for those users who are facing many issues with Telstra internet. The Telstra is the best telecommunication in Australia and you have any types of the issue with your internet connection, data issue then you can visit our site and get the solution and We also provide belong email services and you can dial our toll-free number 1-800-789-560.

  5. Best Coconut Oil is the most varied oil you will come across. From the application of oil on your skin to make it more healthy to use it for eating purposes, it has played a great role in being a multitasking oil in every household. One of its great usages is the application of coconut oil in hair on your hair. Not only does the coconut oil makes Grow Gorgeous your hair healthy and strong, but it also maintains its texture and growth.

  6. That might be the situation on the off chance that you utilize an iPhone, however, it appears to be different gadgets aren’t exactly as great at keeping the trouble makers out. Utilizing fingerprints printed from capacitive ink, specialists at Michigan State University had the capacity to trick those utilized by Samsung and Huawei.
    The analysts started by taking high-goals sweeps of the cell phone proprietor’s unique mark, at that point printing it onto conductive paper utilizing AgIC conductive ink.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.