• Written by Nalin Asanka Gamagedara Arachchilage, Senior Research Fellow in Cyber Security at La Trobe University, UNSW
Even though passcode options include swipe patterns and long passwords, many users still use easy 4-digit PINs. This is because people are often lulled into a false sense of security when they use fingerprint login. SHUTTERSTOCK

Our electronic devices store a plethora of sensitive information. To protect this information, device operating systems such as Apple’s iOS and Android have locking mechanisms. These require user authentication before access is granted.

One of the most common mechanisms is fingerprint login, a form of biometric technology first introduced by Apple in 2013 as Touch ID.

Touch ID was introduced with the intuition that, if there was an easier and quicker way to log in, users would be encouraged to keep stronger passcodes and passwords without sacrificing ease of access. It was supposed to enhance both the usability and security of the device.

However, in application this hasn’t been the case. And most users remain unaware of this initial purpose.

Easy targets

When first unlocking an iPhone after starting it, users are asked to enter a strong six-digit passcode, instead of a simpler four-digit PIN. After that, Touch ID can be used to unlock the phone, to avoid having to re-enter the password multiple times.

The catch is, users can choose to ignore the direction and opt for an easy four-digit PIN, and they usually do.

Researchers found that among Touch ID users, the majority still used weak login codes, mainly four-digit PINs (which are easy to guess). This was also true among people who didn’t use Touch ID.


Read more: Fingerprinting to solve crimes: not as robust as you think


They also found more than 30% of participants weren’t aware they could use passwords with letters (which are stronger) instead of four-digit PINs.

Some participants indicated they used PINs for quicker access, compared to passwords. And most agreed that Touch ID offered usability benefits including convenience, speed and ease of use.

Interestingly, there was also a disconnect between how secure users thought their passcodes were, and how secure they actually were.

In fact, only 12% of participants correctly estimated their passcode’s strength

Knowledge is key

It’s important to understand how fingerprint login and other biometric systems work, before we use them.

A biometric is a unique biological characteristic which can be used to identify and verify a person’s identity. Apart from fingerprints, we see this in facial recognition scans, DNA tests, and less commonly in palm prints, and iris and retina recognition.

Biometrics are marketed as being a very secure solution, because the way biometric data is stored is different to the ways PINs and passwords are stored.

While passwords are stored on the cloud, data from your fingerprint is stored solely on your device. Servers and apps never have access to your fingerprint data, nor is it saved on the cloud.


Read more: iPhone 5S fingerprint scanning: thumbs up or down?


However, although it’s incredibly hard for cybercriminals to get access to your actual fingerprint data – since it’s encrypted and stored on the device itself – biometric systems are still not completely secure.

For instance, Apple’s fingerprint technology was compromised just two days after the launch of Touch ID (integrated into the iPhone 5S) in 2013. And since then, many people have managed to bypass Touch ID security by using dental mold or play-dough.

Similarly, it was shown that even the 2017 iPhone X’s Face ID feature could be compromised.

Users who use Touch ID with a four-digit PIN backup are also at risk. They’re susceptible to “shoulder surfing” attacks, where attackers simply look over a victim’s shoulder to see them input their PIN.

Other types of attacks include password guessing and even thermal fingerprint scanning, which involves using a thermal device to figure out which areas on a screen were most recently pressed, thereby potentially revealing a passcode combination.

A permanent mark

The elephant in the room is that once biometric data such as a fingerprint is stolen, it’s stolen forever. Unlike a password, it can’t be changed.

Stolen biometric data can be used to identify users without their knowledge, especially if users are unaware of how their data is stored and collected.


Read more: Fingerprint and face scanners aren’t as secure as we think they are


That said, cybercriminals generally prefer to break into people’s devices through mind games, by luring victims into clicking on links or downloading attachments which eventually disclose their login credentials.

In public, a criminal might ask to borrow your phone for a call. In such situations, it’s often easy for them to steal your PIN simply through observation, rather than having to actually break into your device.

Touch ID technology was designed to enhance security and usability, and it would have, if people hailed its initial purpose and kept stronger passcodes.

But they don’t, because often they don’t understand the basis of the technology. With biometric technology, users experience a false sense of security. They remain unaware of the many ways in which their information could still be stolen.

This is why users should educate themselves on how the technologies they use function, and the purpose for which they were designed. Failing that, they risk leaving the back door wide open for cybercriminals.

Nalin Asanka Gamagedara Arachchilage works as Senior Research Fellow at La Trobe University.

Authors: Nalin Asanka Gamagedara Arachchilage, Senior Research Fellow in Cyber Security at La Trobe University, UNSW

Read more http://theconversation.com/fingerprint-login-should-be-a-secure-defence-for-our-data-but-most-of-us-dont-use-it-properly-127442

Working from home; Should you adopt a dog?

Unless you’ve been lucky enough to win a US Powerball jackpot, most of us need to work. With a huge chunk of the work force working in isolation from the comfort of home, the Covid-19 crisis seem...

Luke Drummond - avatar Luke Drummond

Eight best sofa trends to follow

The key feature you must consider while buying the sofa is that it should bring comfort as well as style to your home. You should invest wisely, else it could appear as a valueless investment, but a...

News Company - avatar News Company

REASONS TO LOVE BOWLING FOR THE PERFECT ENTERTAINMENT

During the 1950s, bowling was among the most famous games. Still, this amazing game is ruling the hearts of people. It is the best option during summers because you don't need to go outside. However...

News Company - avatar News Company

DIFFERENT TYPES OF FANCY LIGHTS YOU CAN USE IN YOUR HOME

Home improvement ideas are hard to define. They vary from person to person, and every idea sounds like the best. What did you think of changing during your home renovation? There must have been seve...

News Company - avatar News Company

THINGS TO CONSIDER WHILE DESIGNING YOUR POOL AREA

In summers, everyone looks for a spot to laze around to save themselves from the hot summer heatwave. If you like to work out and relax your body, then having a swimming pool in the house or backyar...

News Company - avatar News Company

Yes, we're flattening the coronavirus curve but modelling needs to inform how we start easing restrictions

ShutterstockAustralia is on track to flatten the curve of coronavirus cases, which will allow our health system to cope with increasing demand for intensive care unit (ICU) beds, recently released mod...

Tony Blakely, Professor of Epidemiology, University of Melbourne - avatar Tony Blakely, Professor of Epidemiology, University of Melbourne

Courts are moving to video during coronavirus, but research shows it's hard to get a fair trial remotely

Erin Nealey/FlickrIn the past, the courts were ideal breeding grounds for spreading disease. In what became known as the “Black Assize”, a deadly fever that swept through prisons and court...

Meredith Rossner, Professor of Criminology, Australian National University - avatar Meredith Rossner, Professor of Criminology, Australian National University

Now we're in lockdown, how can we get out? 4 scenarios to prevent a second wave

shutterstock/The ConversationAustralia is effectively in lockdown. Public gatherings of more than two people are banned and people are only permitted to leave home for a limited set of reasons. The re...

James Trauer, Senior Research Fellow, Monash University - avatar James Trauer, Senior Research Fellow, Monash University

Indonesia was in denial over coronavirus. Now it may be facing a looming disaster

HOTLI SIMANJUNTAK/EPAAlmost no one thinks Indonesia is handling the COVID-19 pandemic well.Until early March, the government claimed it had no cases of infection, something the eccentric health minist...

Tim Lindsey, Malcolm Smith Professor of Asian Law and Director of the Centre for Indonesian Law, Islam and Society, University of Melbourne - avatar Tim Lindsey, Malcolm Smith Professor of Asian Law and Director of the Centre for Indonesian Law, Islam and Society, University of Melbourne

Sick and Tired of Your Dead End Job? Try Teaching!

Tired of the same old grind at the office? Want an opportunity to impact lives both in your community and around the world? Do you love to travel and have new experiences? Teaching English is the perfect job for you! All you need is a willingness to ...

News Company - avatar News Company

The Impact of an Aging Population in Australia

There’s an issue on the horizon that Australia needs to prepare for. The portion of elderly citizens that make up the country’s overall population is increasing, and we might not have the infrastructure in place to support this. Australians h...

News Company - avatar News Company

CBD



News Company Media Core

Content & Technology Connecting Global Audiences

More Information - Less Opinion