The security systems that mobile devices implement every day are on the rise and yet they cannot be guaranteed to be 100 percent reliable. Such as the security codes, the unlock pattern, facial recognition , etc.
But how safe are they, in the next article we will tell you How safe is facial recognition on mobile devices?
It is that apparently all these security systems that have been implemented by Android devices or those of the Apple company may have some vulnerability.
Although Apple always leads and gets tired of saying that Face ID is much more secure than Touch ID . The truth is that these systems are being tested and the results have not been very favorable.
The evolution is such that it is possible that in a short time there will be another way to unlock your mobile device. Remember that at first it all started with password locks, then alphanumeric codes, unlock patterns, fingerprint and now facial recognition to unlock Apple devices with Android .
How safe is facial recognition on mobile devices?
Everything in life has its counterpart, while on the one hand systems are created and perfected that allow you to give your mobile devices better means to prevent access to them.
On the other hand, there are those called hackers who are in charge of creating tools that allow these security systems to be deceived, in an eternal struggle.
But in order to understand a little more than what we are talking about, let’s see what facial recognition is. It is a technology that is based on the analysis of facial features and these are stored in a database.
But it is also known as facial biometrics and was implemented long ago in locks and currently in airports in the United States and China.
So how does this system work on mobile devices? It is a good question, the first thing you should do is take a picture of your face through your phone. This is the so-called detection phase. After this, the image is processed, where special characteristics of the image, alignment of the eyes, nose, etc. are searched.
This is also known as biometric analysis and once information about your facial features has been collected, they are stored in a database.
The success of this security system depends on this pattern. And then we would go to the last step and that is the comparison, every time you want to enter your mobile you will be asked for facial recognition.
Here it compares the face that is presented with the information stored in the database if the degree of similarity exists between the two patterns.
In other words, between the stored one and the one that is being presented to you at this moment. The system analyzes these patterns within certain ranges and if the similarity has a very high percentage, the system unlocks the mobile.
But we can trust this security method
A renowned Forbes reporter, conducted an experiment and used various mobile devices or also known as Smartphone.
He also made a 3D print of his face and put it in front of his phone to see if he could fool the security system. His surprise was such that 4 of the 5 phones were tricked.
But his surprise was greater when he found that the 4 phones that were deceived had an Android operating system. And the one that could not be fooled was the iPhone X , which can show you that Android devices should not take facial recognition as the main security system and that Apple has a more robust and secure system.
But in general, it is not a 100 percent secure system yet and we suggest you not use it as your primary security system. To avoid possible intrusions to the privacy of your device.