{"id":16966,"date":"2018-03-15T08:00:54","date_gmt":"2018-03-15T12:00:54","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16966"},"modified":"2022-04-28T08:56:04","modified_gmt":"2022-04-28T12:56:04","slug":"facial-recognition-security-android-smartphone","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/facial-recognition-security-android-smartphone\/","title":{"rendered":"Is Facial Recognition the Most Secure Option for Your Smartphone?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As our devices move forward technologically, so do our ways of protecting them from unwanted eyes. For Android devices, unlock patterns and pins have been around from almost the very beginning.\u00a0 But, with the advent of more advanced facial recognition, how secure is it and should you be using it instead of a pin or pattern?<\/span><\/p>\n<p><b>The Simple Option &#8211; Patterns<br \/>\n<\/b><span style=\"font-weight: 400;\">Back in 2009, when users were introduced to the second version of Android, known as \u2018Eclair,\u2019 individuals were treated to something sweet, the ability to unlock their phones with simple patterns. A grid of nine dots was presented to users, swiping between these dots in a specific manner would create an easy way to unlock your smartphone. It was a convenient solution that could be mastered with one hand on the go, but is it secure?<\/span><\/p>\n<p><strong>Read More: <a href=\"https:\/\/www.psafe.com\/en\/blog\/how-safe-is-finger-recognition-bank-app\/\">How Safe is it to Use Finger Recognition with Your Bank App?<\/a><\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Pattern unlock has remained on Android phones to this very day. However, don\u2019t be fooled by a simple trick &#8212; unlocking your phone with a pattern is <\/span><a href=\"https:\/\/arstechnica.com\/information-technology\/2015\/08\/new-data-uncovers-the-surprising-predictability-of-android-lock-patterns\/\"><span style=\"font-weight: 400;\">the most insecure option<\/span><\/a><span style=\"font-weight: 400;\"> you could select. As with other authentication methods, it all starts with how complex of a pattern you choose, with most users opting for short \u2018dot\u2019 combinations or ones that could be easily guessed. Even with a complex passcode, your finger will typically leave oil trails on the screen that are easy to see, giving away your code. This is one \u2018security\u2019 method that\u2019s best to avoid.<\/span><\/p>\n<p><b>The Trusty Familiar &#8211; Pincodes<br \/>\n<\/b><span style=\"font-weight: 400;\">Pincodes remain a stable and secure option to protect your smartphone as long as best practices are followed. Choosing a four-digit code such as \u20181234\u2019 or \u20181111\u2019 is extremely easy to guess and won\u2019t fool anyone attempting to break into your phone. The top recommendation for those creating a pincode is to use as many digits as possible. Older devices typically suggest four numbers, but newer smartphones will almost always default to six.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Again, how secure is this method of locking your phone? The answer is that it all depends on how complicated you choose to make your pincode. Avoid repetitive numbers, memorable dates, or other information that may be guessable if someone knows a bit about your background. Create a random six-digit code, and you\u2019ll have a more secure solution to protect your data.<\/span><\/p>\n<p><b>The New Kid on the Block &#8211; Facial Recognition<br \/>\n<\/b><span style=\"font-weight: 400;\">In recent years, facial recognition has hit the market. Introduced in 2011, Google\u2019s Ice Cream Sandwich Android release brought about the ability for \u2018Face Unlock.\u2019 Android users could easily unlock their phones quicker than ever before. But, if this feature was released seven years ago &#8212; why is it just taking off now? The answer is simple; the technology was premature. Now, device manufacturers aren\u2019t faced with the same limitations as before, and users have found facial recognition quite useful as it has advanced.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to facial recognition on Android devices though, <\/span><a href=\"https:\/\/www.digitaltrends.com\/mobile\/is-facial-recognition-the-new-security-standard\/\"><span style=\"font-weight: 400;\">it just isn\u2019t the most secure at the moment<\/span><\/a><span style=\"font-weight: 400;\">. Trustworthy facial recognition is a careful marriage between hardware and software. Your experience will vary significantly between the smartphone manufacturer and the facial ID system being employed. As of now, we suggest keeping a secure passcode on your device as the majority of manufacturer solutions, including Samsung\u2019s Iris unlock, have had their systems easily beat by photographs being held in front of the camera.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another potential option is to protect specific content you care about most, like your photos or videos. Using solutions like <\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/app.appsflyer.com\/com.psafe.stash?pid=Blog&amp;c=Is_Facial_Recognition_the_Most_Secure_Option_for_Your_Smartphone\" target=\"_blank\" rel=\"noopener\">dfndr vault\u2019s<\/a> premium facial recognition feature <\/span><span style=\"font-weight: 400;\">allows you to hide what matters most. For example, unlock your phone with a complex passcode and then add an extra step of facial recognition for your videos and photos. Consider it the perfect marriage of simplicity and security.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With multiple options to secure your mobile device, what is the most secure? We run down the choices for you.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[249,67,243,223],"class_list":["post-16966","post","type-post","status-publish","format-standard","hentry","category-security","tag-security","tag-smartphone","tag-technology","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16966"}],"version-history":[{"count":2,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16966\/revisions"}],"predecessor-version":[{"id":17970,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16966\/revisions\/17970"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}