a lot at first but i don t anymore because all i wanted to do was check the time and every time the phone would on lock itself obviously i wasn t keen on that as well as being impractical the ivory scanner in the sense of model is easy to outsmart as demonstrated by the hacker starbuck from germany s chaos computer club . he takes a photo of his eye with an infrared camera and prints out that image term special paper to create a three d. effect he attaches a contact lens on to the paper then he just holds up the new image in front of the iris scanner and in the blink of an eye the security mechanism has been cracked. you might be in a cafe or on a train so you need literally a fraction of a second while the eye is open if you keep on filming the person s face with your camera eventually you ll get a decent iris image that you can use. it uses a dot map for the face sighting over thirty thousand laser dots are projected on to
well as being impractical the ivory scanner in the sense of model is easy to outsmart as demonstrated by the hackers starbuck from germany s chaos computer club . he takes a photo of his eye with an infrared camera and prince out that image on special paper to create a three d. effect he attaches a contact lens. on to the paper then he just holds up the new image in front of the iris scanner and in the blink of an eye the security mechanism has been cracked. you might be in a cafe or on a train you need literally a fraction of a second while the eye is open if you keep on filming the person s face with your camera eventually you ll get a decent iris image that you can use. uses a dot map for the face sighting over thirty thousand laser dots are projected on to the face which you can only see with an infrared camera a camera reads the map and convert it into a three d. model which is in turn matched against the key data stored beforehand. in addition