SHARE
Facebook X Pinterest WhatsApp

Mixed Reactions to Touch ID Security

By now you have likely heard the buzz about the iPhone 5S, particularly about its security feature, Touch ID.  As CNN explained it, the phone has the ability to turn your fingerprint into a password. It sounds like a great idea, and as my regular readers know, I applaud all efforts to improve security on […]

Written By
SP
Sue Poremba
Sep 12, 2013

By now you have likely heard the buzz about the iPhone 5S, particularly about its security feature, Touch ID.  As CNN explained it, the phone has the ability to turn your fingerprint into a password.

It sounds like a great idea, and as my regular readers know, I applaud all efforts to improve security on any device—especially security introduced by Apple. Touch ID could be a boon to BYOD security. According to Trend Micro, upwards of 60 percent of smartphone users don’t lock their device with a password or PIN code. While iPhone 5S allows users to bypass Touch ID in favor of using a password, I think that many users will appreciate being able to lock their phone while not having to remember yet another password. That ease of use alone could increase the number of people who now lock their phones. And, as Adrian Kingsley-Hughes wrote in a ZDNet story:

IT admins are always worried about security (or at least they should be), and while the iPhone, like its Android counterparts, allows for remote wiping of devices, biometric protection takes iPhone security to the next level. No more having to worry that about someone watching over your shoulder when you enter your passcode because with the iPhone 5S passcodes will become a thing of the past.

Yet, many security experts aren’t sold on the security behind Touch ID. Dirk Sigurdson, director of engineering, Mobilisafe at Rapid7, told me in an email:

Assuming the iPhone fingerprint reader and matching algorithm do a good job of protecting against fake fingers, biometric authentication should overall improve the security of iOS devices. However, Apple has on a number of occasions released flawed versions of its passcode lock implementation which allows attackers to bypass lock screen protections. With the added complexity of biometric authentication, it’s likely that we’ll continue to see vulnerabilities related to these features. It will remain important for companies to monitor iOS vulnerabilities and to implement a method for updating devices when fixes are available.

Along that line, Joe Schumacher, security consultant at Neohapsis, a security consulting company, was quoted in eWeek:

Fingerprint biometrics is nice, but not a perfect solution, as fingerprints can be dirty or slightly changed to not be recognized. There have been proofs of concept about lifting fingerprints to make copies and unlocking biometric control, but that’s a dedicated attack and the typical user should not worry.

Schumacher also added that he sees Touch ID as a cool feature, but not a security breakthrough. Other experts have pointed out that the fingerprint identification would be better if used as part of a multi-factor authentication option.

Only time will tell how Touch ID works in real life. But if it is getting more people thinking about security in general and helps to improve BYOD security, that’s a very good start.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
Best Enterprise 5G Network Providers 2022
5G Cybersecurity Risks and How to Address Them
Kihara Kimachia
Dec 17, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.