Apple has finally explained most of its security details behind its Touch ID technology. Could this be a knee jerk reaction to people's wow reaction to Samsung Galaxy S5's fingerprint scanner?
Apple has released a new white paper about iOS security, and they explain how it works and it looks like it is far more secure than people may have thought.
The Secure Enclave is responsible for processing fingerprint data from the Touch ID sensor, determining if there is a match against registered fingerprints, and then enabling access or purchase on behalf of the user. Communication between the A7 and the Touch ID sensor takes place over a serial peripheral interface bus. The A7 forwards the data to the Secure Enclave but cannot read it. It's encrypted and authenticated with a session key that is negotiated using the device's shared key that is built into the Touch ID sensor and the Secure Enclave. The session key exchange uses AES key wrap- ping with both sides providing a random key that establishes the session key and uses AES-CCM transport encryption.
The 88-by-88-pixel, 500-ppi raster scan is temporarily stored in encrypted memory within the Secure Enclave while being vectorized for analysis, and then it's discarded after. The analysis utilizes subdermal ridge flow angle mapping, which is a lossy process that discards minutia data that would be required to reconstruct the user's actual finger- print. The resulting map of nodes never leaves iPhone 5s, is stored without any identity information in an encrypted format that can only be read by the Secure Enclave, and is never sent to Apple or backed up to iCloud or iTunes.
On devices with an A7 processor, the Secure Enclave holds the cryptographic class keys for Data Protection. When a device locks, the keys for Data Protection class Complete are discarded, and files and keychain items in that class are inaccessible until the user unlocks the device by entering their passcode. On iPhone 5s with Touch ID turned on, the keys are not discarded when the device locks; instead, they're wrapped with a key that is given to the Touch ID subsystem. When a user attempts to unlock the device, if Touch ID recognizes the user's finger- print, it provides the key for unwrapping the Data Protection keys and the device is unlocked. This process provides additional protection by requiring the Data Protection and Touch ID subsystems to cooperate in order to unlock the device. The decrypted class keys are only held in memory, so they're lost if the device is rebooted. Additionally, as previously described, the Secure Enclave will discard the keys after 48 hours or 5 failed Touch ID recognition attempts.
It is about time they explained stuff. Weird that it took them this long. [Apple via Engadget]
A stable wireless connection supports multiple aspects of daily activities. However, the signal strength may get reduced in distant bedrooms, upper floors or balcony spaces. This happens because the intensity of radio waves reduces as they travel through walls, ceilings and furniture. Most of the standard Wi-Fi routers' coverage stays around 140 to 230 square meters. By using the correct steps, you can extend the Wi-Fi network range across your home and office. Read more
It is probably safe to say that the vast majority of us appreciate being able to safely go about our business. We are not looking to cause trouble or have it find us. With that in mind, most of us at least make a minimal effort to secure our homes. But cost can be a factor in determining just how far we go with home security. Read more
The Rewarded Social Outlook for 2026, Anonymous chat is experiencing a transition from a random and unmonitored chat system to a "Rewarded Socializing" system with the initiative led by the C24Club "Chat-to-Earn" platform. Rewarded platforms can improve the average length of chat sessions by 30% and cut toxicity and improve safety cases by 60%. Read more