Tutorials

How secure is facial recognition on mobile devices?

The security systems that mobile devices implement every day are on the increase and yet they cannot be guaranteed to be 100% reliable. Such as security codes, unlock pattern, facial recognition , etc.

But how safe are they, in the next article we you say in How safe is facial recognition on mobile devices?

It's that apparently all these security systems that have been implemented by android devices or those of the Apple company may present some vulnerability.

Although Apple always takes the lead and gets tired of saying that Face ID is much more secure than touch ID . The truth is that these systems are being tested and the results have not been very favorable.

The evolution is such that it is possible that in a short time there will be another way to unlock your mobile device. Remember that at first it all started with password locks, then alphanumeric codes, unlock patterns, fingerprints and now facial recognition to unlock the appliances Apple Lossless Audio CODEC (ALAC), with android .

How secure is facial recognition on mobile devices?

Everything in life has its equivalent, while on the one hand, systems are created and perfected that allow you to give your mobile devices better ways to prevent access.

On the other hand, there are those called the hackers who are responsible for creating tools to deceive these security systems, in an eternal struggle.

But to understand a little more than what we're talking about, let's see what facial recognition. It is a technology based on the analysis of facial features and these are stored in a database.

But it's also known as facial biometrics, and it was implemented in locks a long time ago and now at airports in the United States and China.

So, how does this system work on mobile devices? That's a good question, the first thing to do is take a photo of your face through your phone. This is the so-called detection phase. After that, the image is processed, where the special features of the image, the alignment of the eyes, nose, etc. are wanted.

This is also known as biometric analysis and once the information about your facial features has been collected it is stored in a database.

The success of this security system depends on this model. And then we would go to the last step and that's the comparison, every time you want to enter your mobile you will be asked for facial recognition.

Here it compares the presented face with the information stored in the database if the degree of similarity exists between the two models.

That is, between the one stored and the one presented to you right now. The system analyzes these models in certain ranges and if the similarity has a very high percentage, the system unlocks the mobile.

But we can trust this security method

A renowned Forbes reporter, conducted an experiment and used various mobile devices or also known as a Smartphone.

He also made a 3D print of his face and put it in front of his phone to see if he could cheat the security system. His surprise was such that 4 of the 5 telephones were deceived.

But his surprise was greater when he discovered that the 4 deceived phones had an Android operating system. And the one who could not be fooled was the iPhone X , which can show you that in Android devices, facial recognition should not be considered as the system of main security and that Apple has a more robust and secure system.

But in general terms, it is not yet a 100% secure system and we suggest that you do not use it as the primary security system. To avoid possible intrusions into the privacy of your device.

Similar items

Leave your comment

Your email address will not be published. Required fields are marked with *

Button back to top