Giving the Fingerprint

BeckyStrause

Apple just released the new iPhone 5s with a new the new security feature of Touch ID.  This new fingerprint identity sensor is part of the home button and allows the user to unlock his phone without a password.  Apple explains it this way (emphasis mine), “Put your finger on the Home button, and just like that your iPhone unlocks. It’s a convenient and highly secure way to access your phone. Your fingerprint can also approve purchases from iTunes Store, the App Store, and the iBooks Store, so you don’t have to enter your password. And Touch ID is capable of 360-degree readability. Which means no matter what its orientation — portrait, landscape, or anything in between — your iPhone reads your fingerprint and knows who you are. And because Touch ID lets you enroll multiple fingerprints, it knows the people you trust, too.”

“Highly secure” seems to be a debatable phrase.  Tech writers everywhere are talking about how Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apples Touch ID by basically copying the users’ fingerprint and creating a fake.  The way they did it is all explained in this step-by-step guide.  Some say this is nothing to worry about because if someone is stealing your finger prints, you have something bigger to worry about.  I see what they’re saying, but don’t entirely agree.  The fact of the matter is, it’s been proven that stealing  your fingerprint to unlock your phone is relatively easy to accomplish and seemingly something that most people could learn to do.  So, how safe is Touch ID security?  As a first level, with a PIN acting as a second level of security, it’s very secure.  But if you’re using just your fingerprint, you may be missing something.

Senator Al Franken pointed out in his critic of the iPhone 5s security that, “Passwords are secret and dynamic; fingerprints are public and permanent,” Franken wrote. “If you don’t tell anyone your password, no one will know what it is. If someone hacks your password, you can change it — as many times as you want. You can’t change your fingerprints. You have only ten of them. And you leave them on everything you touch; they are definitely not a secret. What’s more, a password doesn’t uniquely identify its owner — a fingerprint does. Let me put it this way: if hackers get a hold of your thumbprint, they could use it to identify and impersonate you for the rest of your life.”

The other issue of using a fingerprint as sole security authentication is a legal one.  This article on HITB Sec News brings up the legal effects of moving from PINs to fingerprints.  As they point out, the Fifth Amendment may not protect a person “when it comes to biometric-based fingerprints (things that reflect who we are) as opposed to memory-based passwords and PINs (things we need to know and remember).”

As much as it may be a pain to continue using a PIN for security, it may be the best option… at least for today.  As always, we’re anxious to see what tomorrow brings.

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers