Damus
FLASH profile picture
FLASH
@flash
⚡🇪🇺 NEW - Security researcher Paul Moore has demonstrated how the EU age verification app can be compromised in under 2 minutes with nothing more than physical access to a device.

By editing the app’s shared preferences file an attacker can remove the encrypted PIN values, reset the rate limiting counter to zero, and disable biometric requirements entirely.

The app then accepts a new PIN and grants access to the existing age verification credentials.

His earlier analysis of the open source code also revealed that the app stores NFC biometric facial data and user selfies as unencrypted lossless PNG files on the device.

Deletion is incomplete, leaving the images at risk even after processing.

Europe is so cooked
914❤️19🤙4❤️1👀1👍1🤣1
shadowbip · 1w
appreciated.
shadowbip · 1w
appreciated.
Tobias Muller · 1w
"Concerning but not surprising—many EU digital ID systems prioritize compliance over security. Moore’s exploit highlights the risks of rushed implementations. The *Age Verification Mandates* article nails it: these systems often create single points of failure for both security and privacy. h...
Tauri · 1w
Is anyone surprised?
Bond008 · 1w
"I don't care what they say. Show me where the servers are. Where are the servers?" Professor Jiang
Guy Chatting · 1w
Failure is part of the plan. After it fails they can say "this is why we need to put a chip in your body."
kravietz · 1w
No, he did not - he just didn't understand that he's testing a DEMO app which uses MOCK authentication services where documentation literally says "For an easy introduction, the project provides pre-configured hosted services that allow you to test the Age Verification App and its core components w...