The $1200 worth of Apple iPhone X can be hacked and yes, what you’ve read is cent per cent correct! A Chinese researcher named Wish Wu claims that he can hack an iPhone X under certain conditions. But his antics won’t work with other models released by the technology giant such as iPhone XS and iPhone XS Max.
Wu was supposed to display his talent at a hacking conference. But his research employer canceled the event as it called the hacking skills of the Wish Wu ‘misleading’ and ‘unethical’.
To those who aren’t aware of the whole story which is currently buzzing on Google Trends, here’s a summary of it. Wu claims that he can crack the code of biometric facial recognition on iPhones supplied by Apple, Inc.
However, Apple claims that there is only a one in a million chance that a person could betray its facial ID, vs one in 50,000 chance that would happen with its fingerprint scanners on its iPhones.
Last year, Phil Schiller, the Senior Vice President of the worldwide marketing, Apple Inc literally challenged the world to hack the security technology of the latest breed of iPhones. And Wish WU accepted this and came up with a technique of bypassing the strong face id by deceiving depth and IR camera sensors with manipulated AI algorithms.
Wu also announced through Twitter that he will be displaying his talent at the Black Hat Asia hacking conference to be held in March this year in Singapore.
But his employer Ant Financial which offers Alipay payment system compatible with iPhone X announced this week that the event was canceled as the bypassing techniques of Wu lacked credibility.
Note- Apple’s facial recognition technology on iPhones uses a combination of cameras and special sensors to capture a 3- dimensional scan of a face which allows it to distinguish between real images and spoofs. So, when a bad guy with nefarious intentions tries to take pictures of the user when he/she is asleep or otherwise not looking the phone, then tries to use those images to unlock the phone, the sensors reject such security claims to keep the device secure from false intrusions.