Apple’s Face ID recognition on the iPhone X is still making headlines, but for the wrong reasons. Post the iPhone X going on sale, there were reports of the Face ID being easily fooled. Cybersecurity firm Bkav successfully unlocked the iPhone using a 3D-printed mask. The firm is back again with a new mask and advises iPhone X users not to use Face ID for business transactions. Also Read - Good news for iPhone loves! Apple beats Xiaomi to regain second position in global smartphone marketAlso Read - Apple Music could soon release on the PlayStation 5: Report
This time, Bkav used stone powder to make “the mask ver 2.0” and used 2D images for the eyes. Bkav replaced paper tape with stone powder which turned out to be better at tricking Face ID. Also, the security firm used the same technology that Face ID uses which is printed infrared images for the eyes. Prior to testing the mask, Bkav made sure that the iPhone X is protected with the owner’s Face ID recognition and also all the security options are toggled on. Also Read - Arm-based notebook PC processor market could grow to $949 million in 2021
In the same process as before, the iPhone X is placed in front of the new mask. After a few seconds of getting the right position, you can clearly see in the video that the iPhone X is unlocked. Here, Bkav is employing the theory of how twins unlocked the iPhone X.
The mask acts as an artificial twin of the device’s owner and can easily unlock it. Bkav also stresses on the fact that Face ID shouldn’t be used for business transactions as Face ID is still not secure enough.
Apple itself recommended using a passcode if anyone wishes to protect their sensitive data from an “evil twin”. With this experiment, it is shown that one can actually clone a face on a mask and use the iPhone X. This level of possibility of one’s face being cloned to unlock the device sounds a bit over the top, and something you’d expect to see only in movies. But nevertheless if you’re worried about privacy, with an iPhone X, it’s best to use a passcode as well and not rely on only one form of security.