{"id":134706,"date":"2019-04-15T18:59:17","date_gmt":"2019-04-15T18:59:17","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/en\/?p=134706"},"modified":"2025-07-01T22:06:44","modified_gmt":"2025-07-02T05:06:44","slug":"3d-printing-security-threat","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/3d-printing-security-threat\/","title":{"rendered":"Does 3D printing pose a threat to security?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-134708\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/10\/700_3D_printing_xrtt7l.jpg\" alt=\"3D Printing\" width=\"700\" height=\"394\" \/><\/p>\n<p>When most of us think about 3D printing, nothing malicious comes to mind. You probably think about someone 3D printing a small toy, or even<a href=\"https:\/\/www.youtube.com\/watch?v=42Ioxp9HdFY\" target=\"_blank\" rel=\"noopener noreferrer\"> a patient receiving a 3D printed hip.\u00a0<\/a><\/p>\n<p>Although there are many benefits,\u00a0the security risks from 3D printing range from compromising our privacy to threatening human lives.<\/p>\n<h2>Fooling your phone<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-134710\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/10\/700_Fingerprint_j0rqj0.jpg\" alt=\"Fingerprint scanner\" width=\"700\" height=\"365\" \/>Recently, <a href=\"https:\/\/imgur.com\/gallery\/8aGqsSu\" target=\"_blank\" rel=\"noopener noreferrer\">an Imgur user posted that he was able to fool the Samsung Galaxy S10 with a 3D printed finger.\u00a0<\/a>\u00a0If you only use fingerprint security, a hacker using this technology could 3D print your\u00a0finger and <strong>access your\u00a0information in less than 15 minutes.\u00a0<\/strong><\/p>\n<p>You might think that getting your\u00a0fingerprint is difficult, but it is easier than you would think. The Imgur user <a href=\"https:\/\/imgur.com\/user\/darkshark\" target=\"_blank\" rel=\"noopener noreferrer\">darkshark\u00a0<\/a>was able to do so <strong>by photographing his fingerprint on a wine glass.\u00a0<\/strong>From there, the process of printing the fingerprint<strong> took less than three minutes.\u00a0<\/strong><\/p>\n<p>Many people not only use fingerprint scans to protect their phones <strong>but also their bank accounts.\u00a0<\/strong>Through 3D printing, having your fingerprint stolen can be just as damaging as having your credit card stolen.<\/p>\n<h2>Access to guns<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-134712\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/10\/700_3d_gun_gsogrq.jpg\" alt=\"3D printed guns\" width=\"700\" height=\"526\" \/><\/p>\n<p>The truth about 3D printed guns is that they aren&#8217;t the best option. They&#8217;ve <a href=\"https:\/\/theconversation.com\/3d-printed-guns-may-be-more-dangerous-to-their-users-than-targets-103724\" target=\"_blank\" rel=\"noopener noreferrer\">known to be unreliable, and often times fragile.<\/a> If you want a gun that works, you&#8217;re better off a real one. However, that does not mean that 3D printed guns aren&#8217;t dangerous.<\/p>\n<p>The biggest issue with 3D printed guns is their availability. If someone has access to the necessary materials, they can print as many guns as they want <strong>minus whatever background checks are necessary.\u00a0<\/strong>Recently, <a href=\"https:\/\/www.bbc.com\/news\/world-us-canada-47243007\" target=\"_blank\" rel=\"noopener noreferrer\">a man in Dallas was arrested<\/a> after he was found with a partially 3D-printed weapon and a hit list. Although he was caught before he carried out his mission, <strong>this should be a wake-up call for government leaders.\u00a0<\/strong><\/p>\n<p>Not even John Wick can commit a major act of terrorism with a 3D gun. However, <strong>availability and the ability to bypass regulations make them a big problem.\u00a0<\/strong><\/p>\n<h2>Life-threatening design flaws<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-134711\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2021\/06\/700_Plane_crash_kbhctt.jpg\" alt=\"Plane crash\" width=\"700\" height=\"467\" \/>A <a href=\"https:\/\/releases.jhu.edu\/2016\/06\/08\/johns-hopkins-team-makes-hobby-drones-crash-to-expose-design-flaws\/\" target=\"_blank\" rel=\"noopener noreferrer\">2016 report from a Johns Hopkins University research team<\/a> showed how hackers can put in an intentional design flaw into a drone.<\/p>\n<p>The team <strong>&#8220;hacked&#8221; into the schematics for a drone, and put a few design\u00a0flaws into the propeller.<\/strong> The flaws were naked to the human eye but were so damaging that it caused the drone to crash after less than two minutes of flying.<\/p>\n<p>The report raised the question, <strong>&#8220;If this happened to a drone, could it happen to something bigger?&#8221;\u00a0<\/strong><\/p>\n<p>&#8220;With digital becoming physical, <strong>you could implant weaknesses into airplanes, into military tanks, into buildings.<\/strong> You could target people by implanting some kind of flaw that causes their personal devices to critically malfunction,\u201d said Troy Smith, an associate economist for the RAND Corporation.<\/p>\n<h2>What should we do about it?<\/h2>\n<p><strong>The positive impacts of 3D printing far outweigh the negative.<\/strong> For example, doctors are now able to 3D print blood vessels and some organs for human use.<\/p>\n<p>This whole issue comes down to both <strong>cybersecurity and regulation.\u00a0<\/strong><\/p>\n<p>Despite being a flimsy copy<strong>, a 3D printed gun is still a gun and is still capable of killing people.<\/strong> Although the common man might not be able to hack into Boeing and screw up the design of a plane,<strong> there are hackers with these capabilities.\u00a0<\/strong><\/p>\n<p>We need to take keeping 3D printable gun blueprints out of criminals&#8217; hands as seriously as we do with over-the-counter guns. We also <strong>need to upgrade our cybersecurity.\u00a0<\/strong><\/p>\n<p>When it comes to 3D printable fingerprints, it&#8217;s worth the extra 15 seconds to create a password for added security.<\/p>\n<div class=\"sc-related-articles-white\">\r\n<p class=\"sc-related-articles-white__title\">More Softonic Articles<\/p>\r\n  <div class=\"sc-related-articles-white__row\">\r\n    <a title=\"5 tips to prevent security issues with your phone \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/5-tips-to-prevent-security-issues-with-your-phone\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2018\/03\/Screen-Shot-2018-03-19-at-12.34.02.png)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>5 tips to prevent security issues with your phone \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"8 tricks to strengthen your WhatsApp security \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-strengthen-your-whatsapp-security\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/whatsapp-web-screenshot-1024x576-1024x576.png)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>8 tricks to strengthen your WhatsApp security \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n  <div class=\"sc-related-articles-white__row\">\r\n    <a title=\"7 mistakes that put your internet security at risk \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/mistakes-internet-security-risk\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/06\/5mistakesHeader-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>7 mistakes that put your internet security at risk \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n    <a title=\"8 tricks to boost your security on Google Chrome \u25ba\" href=\"https:\/\/en.softonic.com\/articles\/8-tricks-to-boost-your-security-on-google-chrome\">\r\n    <div class=\"sc-related-articles-white__article\">\r\n      <div class=\"sc-related-articles-white__image\">\r\n        <div style=\"background-image:url(https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2017\/11\/crome-security-1024x576-1024x576.jpg)\"><\/div>\r\n      <\/div>\r\n      <div class=\"sc-related-articles-white__text\">\r\n        <p>8 tricks to boost your security on Google Chrome \u25ba<\/p>\r\n      <\/div>\r\n    <\/div>\r\n    <\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>From stealing your bank information to the ability to crash airplanes, 3D printing has growing security concerns.<\/p>\n","protected":false},"author":9180,"featured_media":134707,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[1928,1027],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-134706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-3d-printing","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/134706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9180"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=134706"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/134706\/revisions"}],"predecessor-version":[{"id":326261,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/134706\/revisions\/326261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/134707"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=134706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=134706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=134706"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=134706"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=134706"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=134706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}