Mobile phones that are currently used little or nothing have to do with those used years ago. Before the 'smartphones' existed, mobile phones were mere tools that allowed making and receiving calls. They also allowed users to send and receive text messages.

From the vision we have today, those terminals seem almost paleolithic instruments. And is that, the 'smartphones' used today by much of societyThey are authentic work and entertainment centers.With surprising capabilities, these mobile phones store inside a lot of information from their users, sometimes information that can be very sensitive.

As the capabilities of the phones have been increasing, so have thesecurity systems.Now there are different methods to protect the data, both personal and labor, that the terminals store. Thus, we can find varied unlocking systems, from traditional numerical PIN codes to the most recent examples of biometric recognition. But,Which ones are the safest?

First of all, it should be clarified that using any of the following options is always safer than sinning from the confident and not using any protection. Each of the security systems has some advantages, but also some weaknesses. Therefore, the mobile carrier will have to decide which is his preferred option.

Pin code

Using four digits, which do not have to be the same as those used to start the mobile, you can protect your 'smartphone' easily. It is a fast and secure way to prevent a third party from accessing your terminal. Mustavoid choosing excessively simple digit combinations, such as '1234' or '1111'. It is also not advisable to use combinations with which we have a personal relationship, such as our year of birth.

Password

If we use a very complicated PIN, we run the risk of being forgotten. ShuterStock

Another way to block our mobile phone is to use a password (digits, letters and symbols). In this way we can achieve an almost unlimited number of combinations, which makes the password practically impossible to decipher if we avoid using formulas that are too easy. These first two methods share a disadvantage: If a very complicated password or PIN is used and not related to our person,there is a danger of being forgotten.

Pattern

A similar method to the previous ones is to draw a certain pattern on the screen to proceed to the unlocking.It is also a safe method if we move away from the most common drawings. Thus we must avoid that the pattern is from left to right and from top to bottom. Nor is it positive to use the initial pattern of our name.

However, if our mobile phone is stolen and the thief is able to hack it, these precautions will be of little or no use. There are some applications designed to access operating systems, "bypassing security passwords without any problem" as mentioned above, explained from Certideal.

Fingerprint

The fingerprint is one of the safest systems. Photo: ShutterStock

Each person's fingerprints are something unique. There are no two people with the same fingerprint, so thissystem is the safest. However, even the safest lock modes are not foolproof.

Fingerprints, which are artificial or false fingerprints thatthey can match up to 65% of the timewith the real ones, they can be used to break down the defenses of our 'smartphones'.

The scanners that use the phones when registering the fingerprint, read the different parts and photograph up to ten images of them. Thus, if only one of the parts matches, the device can be accessed.

Iris scanner

The iris scanner is another biometric identification alternative thatworks with an infrared emitterand the appearance of two points on the screen that indicate the user where to look to verify recognition.

Facial recognition

FaceID is not 100% reliable. Photo: ShutterStock

These security systems use the front camera and infrared sensors of the phone to recognize the owner. Apple's FaceID has, according to the company,an error probability of one in a million.

However, the reliability of this system is not full, since the camera examines and memorizes the main features but is not always able to capture the entire depth of the face. In this way, on occasion,it may happen that the device confuses a high quality printed image with the user's own face.

In line with this, a study published by the consumer association of the Netherlands (Consumentenbond) has analyzed 60 models of 'smartphone' and has determined that 26 of them, from manufacturers such as Huawei, Xiaomi and Motorola -among others-, no They are safe and have been able to unlock them with a photograph.

. (tagsToTranslate) What (t) mechanisms (t) unlocking (t) mobile (t) insurance (t) Technology (t) news (t) news (t) news of today (t) lne (t) the new spain ( t) daily (t) newspaper of asturias.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.