Modern Australian
Men's Weekly

.

Fingerprint login should be a secure defence for our data, but most of us don't use it properly

  • Written by Nalin Asanka Gamagedara Arachchilage, Senior Research Fellow in Cyber Security at La Trobe University, UNSW
Fingerprint login should be a secure defence for our data, but most of us don't use it properly

Our electronic devices store a plethora of sensitive information. To protect this information, device operating systems such as Apple’s iOS and Android have locking mechanisms. These require user authentication before access is granted.

One of the most common mechanisms is fingerprint login, a form of biometric technology first introduced by Apple in 2013 as Touch ID.

Touch ID was introduced with the intuition that, if there was an easier and quicker way to log in, users would be encouraged to keep stronger passcodes and passwords without sacrificing ease of access. It was supposed to enhance both the usability and security of the device.

However, in application this hasn’t been the case. And most users remain unaware of this initial purpose.

Easy targets

When first unlocking an iPhone after starting it, users are asked to enter a strong six-digit passcode, instead of a simpler four-digit PIN. After that, Touch ID can be used to unlock the phone, to avoid having to re-enter the password multiple times.

The catch is, users can choose to ignore the direction and opt for an easy four-digit PIN, and they usually do.

Researchers found that among Touch ID users, the majority still used weak login codes, mainly four-digit PINs (which are easy to guess). This was also true among people who didn’t use Touch ID.

Read more: Fingerprinting to solve crimes: not as robust as you think

They also found more than 30% of participants weren’t aware they could use passwords with letters (which are stronger) instead of four-digit PINs.

Some participants indicated they used PINs for quicker access, compared to passwords. And most agreed that Touch ID offered usability benefits including convenience, speed and ease of use.

Interestingly, there was also a disconnect between how secure users thought their passcodes were, and how secure they actually were.

In fact, only 12% of participants correctly estimated their passcode’s strength

Knowledge is key

It’s important to understand how fingerprint login and other biometric systems work, before we use them.

A biometric is a unique biological characteristic which can be used to identify and verify a person’s identity. Apart from fingerprints, we see this in facial recognition scans, DNA tests, and less commonly in palm prints, and iris and retina recognition.

Biometrics are marketed as being a very secure solution, because the way biometric data is stored is different to the ways PINs and passwords are stored.

While passwords are stored on the cloud, data from your fingerprint is stored solely on your device. Servers and apps never have access to your fingerprint data, nor is it saved on the cloud.

Read more: iPhone 5S fingerprint scanning: thumbs up or down?

However, although it’s incredibly hard for cybercriminals to get access to your actual fingerprint data – since it’s encrypted and stored on the device itself – biometric systems are still not completely secure.

For instance, Apple’s fingerprint technology was compromised just two days after the launch of Touch ID (integrated into the iPhone 5S) in 2013. And since then, many people have managed to bypass Touch ID security by using dental mold or play-dough.

Similarly, it was shown that even the 2017 iPhone X’s Face ID feature could be compromised.

Users who use Touch ID with a four-digit PIN backup are also at risk. They’re susceptible to “shoulder surfing” attacks, where attackers simply look over a victim’s shoulder to see them input their PIN.

Other types of attacks include password guessing and even thermal fingerprint scanning, which involves using a thermal device to figure out which areas on a screen were most recently pressed, thereby potentially revealing a passcode combination.

A permanent mark

The elephant in the room is that once biometric data such as a fingerprint is stolen, it’s stolen forever. Unlike a password, it can’t be changed.

Stolen biometric data can be used to identify users without their knowledge, especially if users are unaware of how their data is stored and collected.

Read more: Fingerprint and face scanners aren’t as secure as we think they are

That said, cybercriminals generally prefer to break into people’s devices through mind games, by luring victims into clicking on links or downloading attachments which eventually disclose their login credentials.

In public, a criminal might ask to borrow your phone for a call. In such situations, it’s often easy for them to steal your PIN simply through observation, rather than having to actually break into your device.

Touch ID technology was designed to enhance security and usability, and it would have, if people hailed its initial purpose and kept stronger passcodes.

But they don’t, because often they don’t understand the basis of the technology. With biometric technology, users experience a false sense of security. They remain unaware of the many ways in which their information could still be stolen.

This is why users should educate themselves on how the technologies they use function, and the purpose for which they were designed. Failing that, they risk leaving the back door wide open for cybercriminals.

Authors: Nalin Asanka Gamagedara Arachchilage, Senior Research Fellow in Cyber Security at La Trobe University, UNSW

Read more http://theconversation.com/fingerprint-login-should-be-a-secure-defence-for-our-data-but-most-of-us-dont-use-it-properly-127442

Unlock Durability And Beauty With Burnt Timber Cladding Solutions

Imagine a home or commercial space that not only stands the test of time but also tells a story through its very facade. In the world of architectur...

Offroad Caravans: Built for Adventure Beyond the Beaten Track

Australia’s vast and varied landscapes invite travellers to explore far beyond sealed roads and crowded parks. Offroad caravans are purpose-built ...

The Expert's Guide to Understanding Large Bore Steel Pipe Specifications

When it comes to infrastructure, construction, and various industrial applications, the choice of materials is paramount. Among the options availabl...

Preparing for Your First Trip to San Francisco in 2026

San Francisco has long occupied a particular place in the Australian imagination. It is compact yet complex, progressive but historic, and visually st...

Modern Office Painting in Australia - It's the Real Game Changer

Walk into any modern Australian office today and you'll be struck by the fact it's a whole different beast from the ones we grew up with. Gone are t...

How to Choose the Right Suburb for Your Lifestyle

Choosing the right suburb is one of the most important decisions you’ll make when buying or renting a home. Beyond the property itself, the suburb...

Considering Cryolipolysis Fat Freezing? Here’s What You Need to Know

Body confidence can shift over time, and sometimes even good diet and training can still leave a stubborn area of fat that won’t budge. If you’r...

From Local Tradie to Digital Leader: The Strategy Behind Auto Gate Guys Sydney’s Growth

For many small trade businesses, digital marketing still feels like a buzzword, not a necessity. They rely on word-of-mouth referrals, repeat clients...

Electric Automation System: Smarter Control for Modern Electrical Infrastructure

Modern buildings and industrial facilities are increasingly dependent on intelligent control and efficiency. An electric automation system brings t...

The Damp Truth: Why Your Overflowing Gutters Are an Open Invitation for Termites

When it comes to protecting your home, most people think about visible threats — storm damage, cracked tiles, break-ins. But one of the most destruc...

Is Your Inventory a Sitting Duck? 2 Critical Upgrades to Protect Your Business Assets and Your Bottom Line

Imagine this: you finish a long day on the job, lock up your tools, materials, and work vehicle in the garage, and head home. But overnight, someone b...

Electrician in Melbourne: Reliable Electrical Solutions for Homes and Businesses

Finding a dependable electrician Melbourne is essential when safety, efficiency, and long-term performance matter. Electrical systems form the back...

Rims and Tyres for Sale in Sydney: Performance, Safety, and Style Combined

Finding the right rims and tyres for sale Sydney is about far more than appearance. Tyres and rims directly influence how a vehicle handles, brakes...

Why Access to Doctors in Bundoora Is Essential for Ongoing Community Health

Reliable access to healthcare plays a vital role in maintaining physical wellbeing and peace of mind. Having trusted doctors in Bundoora available ...

Pendant Lights: Elevating Interior Spaces With Style and Purpose

Well-chosen pendant lights have the power to transform interiors by combining focused illumination with strong visual impact. More than just a ligh...

What Sets Professional Family Lawyers in Sydney Apart from General Lawyers?

Choosing the right legal support can make a noticeable difference when dealing with family-related matters. This article will explore what separates...

Balancing Teen Academic Expectations and Wellbeing

For many teenagers, school years are shaped by increasing expectations. Academic performance, future pathways, and comparison with peers can create pr...

Why Ceiling Fans Remain One of the Most Effective Solutions for Year-Round Comfort

Creating a comfortable indoor environment without relying heavily on energy-intensive systems is a priority for many households. Installing ceiling ...