lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c91e407e-f8d3-8f8a-d28c-153ee940da53@vulnerability-lab.com>
Date: Wed, 7 Feb 2018 12:23:46 +0100
From: Vulnerability Lab <research@...nerability-lab.com>
To: fulldisclosure@...lists.org
Subject: Re: [FD] Banknotes Misproduction security & biometric weakness

Am 05.02.2018 um 16:10 schrieb Vulnerability Lab:
> Hello Intern0t (intern0t@...tonmail.com),
> could you please tell me what your strange blabla has to deal with the
> fact that the hologram can be read and accepted as fingerprint because
> of the polipaper inside. Did you see that we changed the finger after
> the save due to the register. If you believe in that this is normal
> behavour or a troll issue, please ask lenovo. They included there
> universal fingerprint from a mark insde a laptop. We figured out by now
> that the hologram can be read to finally bypass with a universal key.
> Thus strange anomaly should for sure not be possible in scans that must
> identify a hologram. If your technical expertise is not high level
> enough then to talk seriously about the issues impact, i cant help you.
>
> Best Regards,
> Vulnerability Laboraotry,

-- 
VULNERABILITY LABORATORY - RESEARCH TEAM
SERVICE: www.vulnerability-lab.com


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ