Fingerprint login is a secure defence – if you use it right

  Last updated December 5, 2019 at 1:47 pm

Topics:  

Those of us using fingerprint login are still using weak passcodes, and it’s giving cybercriminals a pass to our sensitive data.


A fingerprint login should be the most effective way to secure our phones, but hackers are still getting around it. Credit: Shutterstock




Why This Matters: To keep our data safe, we have to understand how to use the technology protecting it.




Our electronic devices store a plethora of sensitive information. To protect this information, device operating systems such as Apple’s iOS and Android have locking mechanisms. These require user authentication before access is granted.


One of the most common mechanisms is fingerprint login, a form of biometric technology first introduced by Apple in 2013 as Touch ID.


Touch ID was introduced with the intuition that, if there was an easier and quicker way to log in, users would be encouraged to keep stronger passcodes and passwords without sacrificing ease of access. It was supposed to enhance both the usability and security of the device.


However, in application this hasn’t been the case. And most users remain unaware of this initial purpose.


Easy targets


When first unlocking an iPhone after starting it, users are asked to enter a strong six-digit passcode, instead of a simpler four-digit PIN. After that, Touch ID can be used to unlock the phone, to avoid having to re-enter the password multiple times.


The catch is, users can choose to ignore the direction and opt for an easy four-digit PIN, and they usually do.


Researchers found that among Touch ID users, the majority still used weak login codes, mainly four-digit PINs (which are easy to guess). This was also true among people who didn’t use Touch ID.




Also: Smartphone security




They also found more than 30% of participants weren’t aware they could use passwords with letters (which are stronger) instead of four-digit PINs.


Some participants indicated they used PINs for quicker access, compared to passwords. And most agreed that Touch ID offered usability benefits including convenience, speed and ease of use.


Interestingly, there was also a disconnect between how secure users thought their passcodes were, and how secure they actually were.


In fact, only 12% of participants correctly estimated their passcode’s strength


Knowledge is key


It’s important to understand how fingerprint login and other biometric systems work, before we use them.


A biometric is a unique biological characteristic which can be used to identify and verify a person’s identity. Apart from fingerprints, we see this in facial recognition scans, DNA tests, and less commonly in palm prints, and iris and retina recognition.




Also: The next biometric security system could be your heart




Biometrics are marketed as being a very secure solution, because the way biometric data is stored is different to the ways PINs and passwords are stored.


Apple’s Touch ID was compromised two days after its launch. Credit: Chesnot/Getty Images


While passwords are stored on the cloud, data from your fingerprint is stored solely on your device. Servers and apps never have access to your fingerprint data, nor is it saved on the cloud.


However, although it’s incredibly hard for cybercriminals to get access to your actual fingerprint data – since it’s encrypted and stored on the device itself – biometric systems are still not completely secure.


For instance, Apple’s fingerprint technology was compromised just two days after the launch of Touch ID (integrated into the iPhone 5S) in 2013. And since then, many people have managed to bypass Touch ID security by using dental mold or play-dough.


Similarly, it was shown that even the 2017 iPhone X’s Face ID feature could be compromised.


Users who use Touch ID with a four-digit PIN backup are also at risk. They’re susceptible to “shoulder surfing” attacks, where attackers simply look over a victim’s shoulder to see them input their PIN.


Other types of attacks include password guessing and even thermal fingerprint scanning, which involves using a thermal device to figure out which areas on a screen were most recently pressed, thereby potentially revealing a passcode combination.


A permanent mark


The elephant in the room is that once biometric data such as a fingerprint is stolen, it’s stolen forever. Unlike a password, it can’t be changed.


Stolen biometric data can be used to identify users without their knowledge, especially if users are unaware of how their data is stored and collected.


That said, cybercriminals generally prefer to break into people’s devices through mind games, by luring victims into clicking on links or downloading attachments which eventually disclose their login credentials.


In public, a criminal might ask to borrow your phone for a call. In such situations, it’s often easy for them to steal your PIN simply through observation, rather than having to actually break into your device.


Touch ID technology was designed to enhance security and usability, and it would have, if people hailed its initial purpose and kept stronger passcodes.


But they don’t, because often they don’t understand the basis of the technology. With biometric technology, users experience a false sense of security. They remain unaware of the many ways in which their information could still be stolen.


This is why users should educate themselves on how the technologies they use function, and the purpose for which they were designed. Failing that, they risk leaving the back door wide open for cybercriminals.


This article was republished from The Conversation under a Creative Commons license. Read the original article here


More Like This


We’re not ready for a looming cyber-emergency


Keeping Your Phone Safe from Hackers




About the Author

Nalin Asanka Gamagedara Arachchilage
Nalin Asanka Gamagedara Arachchilage is a Senior Research Fellow in Cyber Security within the Department of Computer Science and Information Technology at La Trobe University, Australia, where he currently leads the Usable Security Engineering Research Laboratory (USERLab) in the Optus La Trobe Cybersecurity Research Hub.

Published By

Featured Videos

Placeholder
Big Questions: Cancer
Placeholder
A future of nanobots in 180 seconds
Placeholder
Multi-user VR opens new worlds for medical research
Placeholder
Precision atom qubits achieve major quantum computing milestone
Placeholder
World's first complete design of a silicon quantum computer chip
Placeholder
Micro-factories - turning the world's waste burden into economic opportunities
Placeholder
Flip-flop qubits: a whole new quantum computing architecture
Placeholder
Ancient Babylonian tablet - world's first trig table
Placeholder
Life on Earth - and Mars?
Placeholder
“Desirable defects: Nano-scale structures of piezoelectrics” – Patrick Tung
Placeholder
Keeping Your Phone Safe from Hackers
Placeholder
Thru Fuze - a revolution in chronic back pain treatment (2015)
Placeholder
Breakthrough for stem cell therapies (2016)
Placeholder
The fortune contained in your mobile phone
Placeholder
Underwater With Emma Johnston
Placeholder
Flip-flop qubits: a whole new quantum computing architecture
Placeholder
The “Dressed Qubit” - breakthrough in quantum state stability (2016)
Placeholder
Pinpointing qubits in a silicon quantum computer (2016)
Placeholder
How to build a quantum computer in silicon (2015)
Placeholder
Quantum computer coding in silicon now possible (2015)
Placeholder
Crucial hurdle overcome for quantum computing (2015)
Placeholder
New world record for silicon quantum computing (2014)
Placeholder
Quantum data at the atom's heart (2013)
Placeholder
Towards a quantum internet (2013)
Placeholder
Single-atom transistor (2012)
Placeholder
Down to the Wire (2012)
Placeholder
Landmark in quantum computing (2012)
Placeholder
1. How Quantum Computers Will Change Our World
Placeholder
Quantum Computing Concepts – What will a quantum computer do?
Placeholder
Quantum Computing Concepts – Quantum Hardware
Placeholder
Quantum Computing Concepts – Quantum Algorithms
Placeholder
Quantum Computing Concepts – Quantum Logic
Placeholder
Quantum Computing Concepts – Entanglement
Placeholder
Quantum Computing Concepts - Quantum Measurement
Placeholder
Quantum Computing Concepts – Spin
Placeholder
Quantum Computing Concepts - Quantum Bits
Placeholder
Quantum Computing Concepts - Binary Logic
Placeholder
Rose Amal - Sustainable fuels from the Sun
Placeholder
Veena Sahajwalla - The E-Waste Alchemist
Placeholder
Katharina Gaus - Extreme Close-up on Immunity
Placeholder
In her element - Professor Emma Johnston
Placeholder
Martina Stenzel - Targeting Tumours with Tiny Assassins
Placeholder
How Did We Get Here? - Why are we all athletes?
Placeholder
How Did We Get Here? - Megafauna murder mystery
Placeholder
How Did We Get Here? - Why are we so hairy?
Placeholder
How Did We Get Here? - Why grannies matter
Placeholder
How Did We Get Here? - Why do only humans experience puberty?
Placeholder
How Did We Get Here? - Evolution of the backside
Placeholder
How Did We Get Here? - Why we use symbols
Placeholder
How Did We Get Here? - Evolutionary MasterChefs
Placeholder
How Did We Get Here? - The Paleo Diet fad
Placeholder
How Did We Get Here? - Are races real?
Placeholder
How Did We Get Here? - Are We Still Evolving?
Placeholder
How Did We Get Here? - Dangly Bits
Placeholder
Catastrophic Science: Climate Migrants
Placeholder
Catastrophic Science: De-Extinction
Placeholder
Catastrophic Science: Nuclear Disasters
Placeholder
Catastrophic Science: Storm Surges
Placeholder
Catastrophic Science: How the Japan tsunami changed science
Placeholder
Catastrophic Science: How the World Trade Centre collapsed
Placeholder
Catastrophic Science: Bushfires