Computer pirates are avoiding digital footprints to steal their identity

Computer pirates are avoiding digital footprints to steal their identity

Digital fingerprint sensors have existed for a long time, and have become a standard feature in most smartphones. Apple introduced Touch ID in the iPhone 5s in 2013. Since then, it has appeared in 12 main iPhone models (and some iPads too).

Although Apple eliminated it from most phones after iPhone 8, it is still in the iPhone SE series. On the other hand, almost all Android phones in the market have a digital footprint scanner. But are digital footprints impossible to omit? Frank of Deerton, Michigan, asked a similar question that I want to highlight and address because it helps us all:

“Can a website be pirate/committed to password and digital footprint protection (multiple verification)?”

I understand what you are saying, Frank. One would think that, since a digital footprints literally requires its fingerprint, it cannot be ignored. But you would be wrong. While digital footprints are generally safer than facial recognition and passwords, they are not infallible. In fact, there are several ways in which bad actors can avoid them to steal their identity.

Unique Cyberguy’s free report: Obtain my expert technology advice, critical security alerts and exclusive offers, in addition to instant access to my Free Definitive Scam Survival Guide When you register!

Smart Telephone

A smartphone at a table (Kurt “Cyberguy” Knutsson)

5 ways in which bad actors can ignore digital footprints scanners

There are multiple ways in which computer pirates use to avoid digital footprints. Next, I will discuss five of the most prominent methods.

1. Masterprints and Deepmasterprints

Computer pirates exploit the concept of “mastery”, which are digital traces designed to coincide with the impressions of multiple individuals. Researchers from Nyu Tandon developed “Deepmasterprints” Use of automatic learning to generate synthetic fingerprints that can deceive sensors imitating the common digital footprints. These artificial impressions can coincide with a significant percentage of stored digital footprints, especially in devices with less strict security settings.

2. Forged digital footprints using 3D printing

Another trick that computer pirates use is to make fake fingerprints. They can raise impressions of the things that you have touched and then use things such as fabric glue or even 3D printers to make molds. For example, Researchers at Cisco Talos I tried a lot of different ways to do it using 3D printing and tried them on phones such as iPhone 8 and Samsung S10; laptops such as Samsung Note 9, Lenovo Yoga and HP Pavilion X360; And even smart devices like locks.

On average, false fingerprints operated approximately 80% of the time. They could fool the sensors at least once. Interestingly, they could not decipher biometric systems on Windows 10 devices, but they pointed out that this does not necessarily mean that those are safer. It only means that this particular method did not work in them.

19 billion passwords have leaked online: how to protect themselves

3. Attacks for brute force through Sutprint

The attackers have found a cheap way to enter smartphones due to the authentication of fingerprints of the brute force. The method, called Bruteprint, allows attackers to avoid the usual limits that stop too much attempts for failed digital footprints. It works taking advantage of two previously unknown defects in the digital fingerprint system. These failures, named cancel-fact-patch-fail (CAMF) and match-affter-lock (evil), exist due to weak protection for fingerprint data in a part of the hardware called serial peripheral interface (SPI).

Basically, Bruteprint uses an attack of man in the medium based on hardware to kidnap digital fingerprint data. It is between the fingerprint sensor and the safe area of ​​the phone (called the execution environment of trust) and tries as many images of fingerprints as necessary until you find a coincidence. The relief part is that the attacker must have physical access to the phone so that this method works.

4. Side channel attacks with printlistener

Printlistener is a lateral channel attack that captures the sound of a finger slide on a screen to extract digital fingerprint functions. It may sound like something of a science fiction film, but researchers have already created a concept test. When analyzing friction sounds, attackers can reconstruct digital footprint patterns, potentially improving the effectiveness of mastery attacks.

5.

Some devices store digital fingerprint data without adequate encryption. If attackers get access to these unprotected data, they can replicate digital footprints to avoid authentication. For example, in 2024, a poorly configured server presented almost 500 GB of confidential biometric data, including digital footprints, facial scans and personal details of the applicants for the application of the law.

smartphone next to the plant

Image of a smartphone (Kurt “Cyberguy” Knutsson)

Top 20 applications that track you every day

So, can you trust digital footprints?

Digital footprint scanners make it easy and quite safe unlock their devices. As everyone has unique digital footprints, you don’t need to remember complicated passwords. Just a fast touch and is inside. Most modern devices store their digital footprint data in safe parts of the system, and use things like the detection of life to make sure that someone is not trying to deceive the scanner with a false finger.

Even so, no security method is perfect. The qualified attackers have found ways to overcome digital footprints scanners using high -resolution or 3D fingers or taking advantage of defects in how the scanner is communicated with the rest of the device. The risk really depends on how well the scanner is designed and how much effort someone gets to break it. For most people, digital fingerprint authentication is easy, easy and safe enough. However, if it is very confidential information, trust only in biometry may not be the best idea.

How to delete your personal information from people search sites

Fingerprint id

A person who uses a digital footprint for security verification purposes (Kurt “Cyberguy” Knutsson)

10 simple steps to improve the safety and privacy of your smartphone

6 ways to protect your digital footprint data

Safeguard your biometric identity with these essential security measures.

1. Choose trusted telephone marks: If you are buying a phone, stay with brands known as Apple, Samsung or Google. These companies take additional measures to protect their digital footprint data storing them in safe areas of the phone that are more difficult to access. The cheapest or less known brands may not have these protections, which makes it easier for attackers to steal their data.

2. Keep your updated phone: Telephone updates It is not just about new features. They fix the security problems that computer pirates could use to enter their device. If your phone asks you to install an update, do it. Most phones also allow you to activate automatic updates, so you don’t have to worry about remembering. Maintaining your updated software is one of the easiest and most important ways of staying protected.

3. Use strong antivirus software: Install strong antivirus software to detect malware that can compromise biometric data storage. Strong antivirus software offers real-time threat detection characteristics, anti-phishing and privacy to block unauthorized access to digital fingerprint data. The best way to safeguard the malicious links that install malware, which potentially access their private information, is to have strong antivirus software installed on all its devices. This protection can also alert it to the PHISHING Electronic Correos and Ransomware scams, maintaining their personal information and their safe digital assets. Get my elections for the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.

What is artificial intelligence (AI)?

4. Do not trust your fingerprint only: Using a fingerprint to unlock your phone is convenient, but it should not be your only line of defense, especially for confidential applications such as banking or email. Always configure a pin, password or pattern as a backup in your iPhone and Android. In this way, even if someone manages to copy their fingerprint, still need other information to enter.

5. Be careful who handles your phone: If someone else uses their phone, especially a stranger or someone who does not know well, could copy their fingerprint from the screen. It’s weird, but it happens. To reduce this risk, avoid delivering your phone to people unnecessarily and erase your screen occasionally to eliminate clear digital footprints.

6. Only use the digital footprint log with trusted applications: Not all applications that ask for your fingerprint are reliable. It is safer to use the fingerprint login only with applications of known and reliable companies, such as your bank, telephone manufacturer or email provider. If an unknown application requests access to digital footprints, it is better to omit it and use its password in its place.

7. Consider using a personal data elimination service: Even digital footprints can be avoided, and large amounts of personal and biometric data have been exposed in infractions. The use of a personal data elimination service helps reduce your risk by eliminating your confidential information from public databases and data corridor sites, which makes computer pirates difficult to rebuild details that could be used to steal your identity. See my best selections to obtain data disposal services here.

Get a free scan To know if your personal information is now available on the web.

What hackers can learn about a data corridor file

Kurt key takeway

Passwords are generally easier to hack than biometric data such as digital footprints or facial recognition. However, the key difference is that passwords can be changed if they are compromised. Your biometry cannot. Most modern devices allow both options, and biometry can offer an additional security layer by making another person access their phone or applications. They are also fast and convenient, since you do not need to remember or write anything. That said, in most cases, your device still uses a password or a pin when biometric identification does not work, so both systems often go hand in hand.

Click here to get the app News

With the growing sophistication of the methods to avoid the safety of digital fingerprints, what should companies do to stay at the forefront of these threats and better protect user data? Get us knowing in Cyberguy.com/contact

To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter

Ask Kurt a question or let us know what stories we would like to cover

Follow Kurt in his social channels

  • Facebook
  • YouTube
  • Instagram

Answers to Cyberguys most facts:

  • What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
  • What is the best way to stay private, safe and anonymous while navigating the web?
  • How can I get rid of robocalls with data elimination applications and services?
  • How do I eliminate my private internet data?

New Kurt:

  • Try the new Cyberguy games (crosswords, words searches, trivia and more!)
  • Cyberguy exclusive coupons and offers
  • Do not miss these better offers and discounts on the day of the fallen

Copyright 2025 Cyberguy.com. All rights reserved.

Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of ​​the story or comment on Cyberguy.com.

Leave a Reply

Your email address will not be published. Required fields are marked *