Link Details

Link 1037989 thumbnail
User 1183837 avatar

By mobilescruze1
via mobilecruze.com
Submitted: Sep 24 2013 / 08:23

As indicated by a German hacking team, Apple’s Touch ID verification program tends to be conquered making use of a well-honed method when it comes to making a latex duplicate of a person’s fingerprint.
  • 3
  • 0
  • 147
  • 12

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (3)



Voters Against This Link (0)



    Java Performance Optimization
    Written by: Pierre-Hugues Charbonneau
    Featured Refcardz: Top Refcardz:
    1. Design Patterns
    2. OO JS
    3. Cont. Delivery
    4. Java EE7
    5. HTML5 Mobile
    1. Node.js
    2. Debugging JavaScript
    3. OO JS
    4. JSON
    5. Ajax