{"id":13610,"date":"2023-06-02T18:12:46","date_gmt":"2023-06-02T16:12:46","guid":{"rendered":"https:\/\/technews.al\/?p=13610"},"modified":"2023-06-02T18:13:03","modified_gmt":"2023-06-02T16:13:03","slug":"nuk-ka-siguri-sulmi-bruteprint-anashkalon-sigurine-e-gjurmeve-te-gishtave-ne-smartphone","status":"publish","type":"post","link":"https:\/\/technews.al\/?p=13610","title":{"rendered":"Nuk ka siguri: Sulmi &#8216;BrutePrint&#8217; anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone"},"content":{"rendered":"\n<p>N\u00eb nj\u00eb shfaqje t\u00eb guximshme t\u00eb aft\u00ebsive teknologjike, studiuesit n\u00eb Tencent Labs dhe Universiteti Zhejiang kan\u00eb zbuluar nj\u00eb shfryt\u00ebzim novator t\u00eb njohur si &#8216;BrutePrint&#8217;. Kjo metod\u00eb e re e sulmeve kibernetike arrin t\u00eb tejkaloj\u00eb v\u00ebrtetimin e gjurm\u00ebve t\u00eb gisht\u00ebrinjve n\u00eb telefonat inteligjent\u00eb modern\u00eb, duke anashkaluar v\u00ebrtetimin e p\u00ebrdoruesit p\u00ebr t\u00eb fituar kontrollin e pajisjes. \u00cbsht\u00eb nj\u00eb perspektiv\u00eb alarmante, n\u00eb nj\u00eb bot\u00eb q\u00eb gjithnj\u00eb e m\u00eb shum\u00eb mb\u00ebshtetet n\u00eb skanimin e gjurm\u00ebve t\u00eb gisht\u00ebrinjve si mas\u00eb sigurie.<\/p>\n\n\n\n<p>Nj\u00eb sulm kibernetik zakonisht p\u00ebrfshin p\u00ebrpjekje t\u00eb pand\u00ebrprera p\u00ebr t\u00eb thyer kodet ose fjal\u00ebkalimet. \u00cbsht\u00eb nj\u00eb metod\u00eb e p\u00ebrdorur nga hakerat p\u00ebr t\u00eb fituar akses t\u00eb paautorizuar n\u00eb llogari, sisteme ose rrjete t\u00eb ndryshme. Studiuesit kinez\u00eb e kan\u00eb marr\u00eb k\u00ebt\u00eb koncept dhe e kan\u00eb aplikuar at\u00eb n\u00eb fush\u00ebn e siguris\u00eb biometrike, duke shfryt\u00ebzuar at\u00eb q\u00eb ata pretendojn\u00eb se jan\u00eb dy dob\u00ebsi t\u00eb r\u00ebnd\u00ebsishme t\u00eb k\u00ebtyre sistemeve: Cancel-After-Match-Fail (CAMF) dhe Match-After-Lock (MAL).<\/p>\n\n\n\n<p>N\u00eb punimin e tyre teknik, t\u00eb botuar n\u00eb Arxiv.org, studiuesit vun\u00eb n\u00eb dukje nj\u00eb dob\u00ebsi t\u00eb natyrshme n\u00eb nd\u00ebrfaqen periferike t\u00eb sensor\u00ebve t\u00eb gjurm\u00ebve t\u00eb gisht\u00ebrinjve (SPI). Duket se t\u00eb dh\u00ebnat biometrike n\u00eb k\u00ebt\u00eb nd\u00ebrfaqe jan\u00eb t\u00eb mbrojtura n\u00eb m\u00ebnyr\u00eb t\u00eb dob\u00ebt, duke hapur mund\u00ebsin\u00eb p\u00ebr nj\u00eb sulm kibernetik q\u00eb mund t\u00eb rr\u00ebmbej\u00eb imazhet e gjurm\u00ebve t\u00eb gisht\u00ebrinjve.<\/p>\n\n\n\n<p>Metoda &#8216;BrutePrint&#8217;, e shoq\u00ebruar me sulmet SPI MITM, iu n\u00ebnshtrua testimit kund\u00ebr dhjet\u00eb modeleve t\u00eb njohura t\u00eb smartphone-ve. Studiuesit zbuluan se mund t\u00eb b\u00ebnin p\u00ebrpjekje t\u00eb pakufizuara n\u00eb t\u00eb gjitha pajisjet Android dhe HarmonyOS (Huawei), dhe dhjet\u00eb p\u00ebrpjekje t\u00eb mundshme n\u00eb pajisjet iOS.<\/p>\n\n\n\n<p>Megjithat\u00eb, BrutePrint nuk \u00ebsht\u00eb nj\u00eb hakim n\u00eb distanc\u00eb. P\u00ebr t\u00eb nisur nj\u00eb sulm, \u00ebsht\u00eb i nevojsh\u00ebm aksesi fizik n\u00eb pajisje. Hakeruesi gjithashtu ka nevoj\u00eb p\u00ebr akses n\u00eb nj\u00eb baz\u00eb t\u00eb dh\u00ebnash t\u00eb gjurm\u00ebve t\u00eb gisht\u00ebrinjve, e cila mund t\u00eb merret nga grupet e t\u00eb dh\u00ebnave akademike ose publikimet e palicensuara t\u00eb dh\u00ebnave. Pajisjet e nevojshme p\u00ebr sulmin kushtojn\u00eb 15 dollar\u00eb, nj\u00eb shum\u00eb e cila \u00ebsht\u00eb relativisht modeste.<\/p>\n\n\n\n<p>Kur b\u00ebhej fjal\u00eb p\u00ebr testimin n\u00eb bot\u00ebn reale, t\u00eb gjitha pajisjet e testuara Android dhe iOS u zbuluan se ishin t\u00eb prekshme ndaj t\u00eb pakt\u00ebn nj\u00eb sulmi. Pajisjet Android ishin ve\u00e7an\u00ebrisht t\u00eb ndjeshme, duke lejuar p\u00ebrpjekje t\u00eb pafundme t\u00eb gjurm\u00ebve t\u00eb gisht\u00ebrinjve. Pajisjet iOS u treguan m\u00eb elastike, duke parandaluar n\u00eb m\u00ebnyr\u00eb efektive sulmet fillestare, megjith\u00ebse iPhone SE dhe iPhone 7 u zbuluan se ishin t\u00eb ndjesh\u00ebm ndaj k\u00ebtyre sulmeve.<\/p>\n\n\n\n<p>Studiuesit arrit\u00ebn n\u00eb p\u00ebrfundimin se nd\u00ebrsa BrutePrint k\u00ebrkon akses fizik pajisjen e synuar, dhe k\u00ebshtu mund t\u00eb mos duket menj\u00ebher\u00eb k\u00ebrc\u00ebnuese, nuk duhet n\u00ebnvler\u00ebsuar. Teknika mund t\u00eb p\u00ebrdoret nga hajdut\u00ebt p\u00ebr t\u00eb zhbllokuar pajisjet e vjedhura, p\u00ebr t\u00eb nxjerr\u00eb t\u00eb dh\u00ebna t\u00eb vlefshme private, apo edhe p\u00ebr t&#8217;u p\u00ebrdorur nga agjensit\u00eb e zbatimit t\u00eb ligjit n\u00eb hetime, duke ngritur pyetje t\u00eb r\u00ebnd\u00ebsishme n\u00eb lidhje me t\u00eb drejtat e privat\u00ebsis\u00eb dhe \u00e7\u00ebshtjet etike.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>N\u00eb nj\u00eb shfaqje t\u00eb guximshme t\u00eb aft\u00ebsive teknologjike, studiuesit n\u00eb Tencent Labs dhe Universiteti Zhejiang kan\u00eb zbuluar nj\u00eb shfryt\u00ebzim novator t\u00eb njohur si &#8216;BrutePrint&#8217;. Kjo metod\u00eb e re e sulmeve kibernetike arrin t\u00eb tejkaloj\u00eb v\u00ebrtetimin e gjurm\u00ebve t\u00eb gisht\u00ebrinjve n\u00eb telefonat inteligjent\u00eb modern\u00eb, duke anashkaluar v\u00ebrtetimin e p\u00ebrdoruesit p\u00ebr t\u00eb fituar kontrollin e pajisjes. \u00cbsht\u00eb<\/p>\n","protected":false},"author":4,"featured_media":13611,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[37],"tags":[40],"class_list":{"0":"post-13610","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobiles","8":"tag-featured"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Nuk ka siguri: Sulmi &#039;BrutePrint&#039; anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone - Technews.al<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/technews.al\/?p=13610\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nuk ka siguri: Sulmi &#039;BrutePrint&#039; anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone - Technews.al\" \/>\n<meta property=\"og:description\" content=\"N\u00eb nj\u00eb shfaqje t\u00eb guximshme t\u00eb aft\u00ebsive teknologjike, studiuesit n\u00eb Tencent Labs dhe Universiteti Zhejiang kan\u00eb zbuluar nj\u00eb shfryt\u00ebzim novator t\u00eb njohur si &#8216;BrutePrint&#8217;. Kjo metod\u00eb e re e sulmeve kibernetike arrin t\u00eb tejkaloj\u00eb v\u00ebrtetimin e gjurm\u00ebve t\u00eb gisht\u00ebrinjve n\u00eb telefonat inteligjent\u00eb modern\u00eb, duke anashkaluar v\u00ebrtetimin e p\u00ebrdoruesit p\u00ebr t\u00eb fituar kontrollin e pajisjes. \u00cbsht\u00eb\" \/>\n<meta property=\"og:url\" content=\"https:\/\/technews.al\/?p=13610\" \/>\n<meta property=\"og:site_name\" content=\"Technews.al\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-02T16:12:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-02T16:13:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tech Expert\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tech Expert\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/technews.al\/?p=13610\",\"url\":\"https:\/\/technews.al\/?p=13610\",\"name\":\"Nuk ka siguri: Sulmi 'BrutePrint' anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone - Technews.al\",\"isPartOf\":{\"@id\":\"https:\/\/technews.al\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/technews.al\/?p=13610#primaryimage\"},\"image\":{\"@id\":\"https:\/\/technews.al\/?p=13610#primaryimage\"},\"thumbnailUrl\":\"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg\",\"datePublished\":\"2023-06-02T16:12:46+00:00\",\"dateModified\":\"2023-06-02T16:13:03+00:00\",\"author\":{\"@id\":\"https:\/\/technews.al\/#\/schema\/person\/0d9ed995a903005f5e36e2bb709a98aa\"},\"breadcrumb\":{\"@id\":\"https:\/\/technews.al\/?p=13610#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/technews.al\/?p=13610\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/technews.al\/?p=13610#primaryimage\",\"url\":\"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg\",\"contentUrl\":\"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/technews.al\/?p=13610#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/technews.al\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nuk ka siguri: Sulmi &#8216;BrutePrint&#8217; anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/technews.al\/#website\",\"url\":\"https:\/\/technews.al\/\",\"name\":\"Technews.al\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/technews.al\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/technews.al\/#\/schema\/person\/0d9ed995a903005f5e36e2bb709a98aa\",\"name\":\"Tech Expert\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/technews.al\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/technews.al\/wp-content\/uploads\/2023\/11\/Untitled-design-1-96x96.jpg\",\"contentUrl\":\"https:\/\/technews.al\/wp-content\/uploads\/2023\/11\/Untitled-design-1-96x96.jpg\",\"caption\":\"Tech Expert\"},\"url\":\"https:\/\/technews.al\/?author=4\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nuk ka siguri: Sulmi 'BrutePrint' anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone - Technews.al","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/technews.al\/?p=13610","og_locale":"en_US","og_type":"article","og_title":"Nuk ka siguri: Sulmi 'BrutePrint' anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone - Technews.al","og_description":"N\u00eb nj\u00eb shfaqje t\u00eb guximshme t\u00eb aft\u00ebsive teknologjike, studiuesit n\u00eb Tencent Labs dhe Universiteti Zhejiang kan\u00eb zbuluar nj\u00eb shfryt\u00ebzim novator t\u00eb njohur si &#8216;BrutePrint&#8217;. Kjo metod\u00eb e re e sulmeve kibernetike arrin t\u00eb tejkaloj\u00eb v\u00ebrtetimin e gjurm\u00ebve t\u00eb gisht\u00ebrinjve n\u00eb telefonat inteligjent\u00eb modern\u00eb, duke anashkaluar v\u00ebrtetimin e p\u00ebrdoruesit p\u00ebr t\u00eb fituar kontrollin e pajisjes. \u00cbsht\u00eb","og_url":"https:\/\/technews.al\/?p=13610","og_site_name":"Technews.al","article_published_time":"2023-06-02T16:12:46+00:00","article_modified_time":"2023-06-02T16:13:03+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg","type":"image\/jpeg"}],"author":"Tech Expert","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tech Expert","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/technews.al\/?p=13610","url":"https:\/\/technews.al\/?p=13610","name":"Nuk ka siguri: Sulmi 'BrutePrint' anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone - Technews.al","isPartOf":{"@id":"https:\/\/technews.al\/#website"},"primaryImageOfPage":{"@id":"https:\/\/technews.al\/?p=13610#primaryimage"},"image":{"@id":"https:\/\/technews.al\/?p=13610#primaryimage"},"thumbnailUrl":"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg","datePublished":"2023-06-02T16:12:46+00:00","dateModified":"2023-06-02T16:13:03+00:00","author":{"@id":"https:\/\/technews.al\/#\/schema\/person\/0d9ed995a903005f5e36e2bb709a98aa"},"breadcrumb":{"@id":"https:\/\/technews.al\/?p=13610#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/technews.al\/?p=13610"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/technews.al\/?p=13610#primaryimage","url":"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg","contentUrl":"https:\/\/technews.al\/wp-content\/uploads\/2023\/06\/pexels-cottonbro-studio-8382611-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/technews.al\/?p=13610#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/technews.al\/"},{"@type":"ListItem","position":2,"name":"Nuk ka siguri: Sulmi &#8216;BrutePrint&#8217; anashkalon sigurin\u00eb e gjurm\u00ebve t\u00eb gishtave n\u00eb smartphone"}]},{"@type":"WebSite","@id":"https:\/\/technews.al\/#website","url":"https:\/\/technews.al\/","name":"Technews.al","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/technews.al\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/technews.al\/#\/schema\/person\/0d9ed995a903005f5e36e2bb709a98aa","name":"Tech Expert","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/technews.al\/#\/schema\/person\/image\/","url":"https:\/\/technews.al\/wp-content\/uploads\/2023\/11\/Untitled-design-1-96x96.jpg","contentUrl":"https:\/\/technews.al\/wp-content\/uploads\/2023\/11\/Untitled-design-1-96x96.jpg","caption":"Tech Expert"},"url":"https:\/\/technews.al\/?author=4"}]}},"_links":{"self":[{"href":"https:\/\/technews.al\/index.php?rest_route=\/wp\/v2\/posts\/13610"}],"collection":[{"href":"https:\/\/technews.al\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technews.al\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technews.al\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technews.al\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13610"}],"version-history":[{"count":1,"href":"https:\/\/technews.al\/index.php?rest_route=\/wp\/v2\/posts\/13610\/revisions"}],"predecessor-version":[{"id":13612,"href":"https:\/\/technews.al\/index.php?rest_route=\/wp\/v2\/posts\/13610\/revisions\/13612"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technews.al\/index.php?rest_route=\/wp\/v2\/media\/13611"}],"wp:attachment":[{"href":"https:\/\/technews.al\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technews.al\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technews.al\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}