Biometric authentication is a growing part of the tech landscape — it’s in our schools, offices, airports, government buildings, and more recently, in our smartphones. Apple’s introduction of Touch ID in 2013 has paved the way for fingerprint-, face-, and iris-recognition technology to leave the almost exclusive domain of law enforcement and emerge into the mainstream as a way to authenticate your identity and access accounts and physical spaces.
But while biometric data and its applications have taken the fast lane to success, their use also raises new issues around security and privacy that must be considered and managed. There are major risks that are unique to biometric authentication that aren’t present with other forms of authentication, such as passwords. Namely, you can always change your password if it leaks — but what if your password is your face? In this article, we’ll talk about how to understand such risks and mitigate them.
How biometric authentication works
Biometry refers to the measurement and analysis of an individual’s physical traits, such as fingerprints, iris patterns, or even the way a person walks (as in “gait recognition”). This information is digitized by converting the physical characteristics (the ridges on a fingerprint, for example) into biometric templates comprised of data points based on specific formulas.
When a device or service uses biometry for authentication, the primary purpose is to verify that a person is who they claim to be by comparing their biometric data with previously collected and stored data.
There are several ways in which biometric data may be stored and processed, such as through database servers, encrypted tokens, or physical tokens. Typically smartphones use on-device storage of biometric templates, which ensures authentication occurs without any data being sent to a server. Thus, the biometric data remains secure as long as the device itself is not compromised.
Related:- Top 7 GPS Tracker Apps for Android
Benefits of using biometric authentication
There are good reasons biometric authentication has expanded so rapidly. Here are the main ones:
Simplicity and convenience for the user
The overwhelming simplicity, at least from a consumer perspective, is a significant factor in the growing popularity of biometric authentication. After all, it’s much easier to place your finger on a scanner than to type in a 20-character password.
Biometry may provide greater levels of authenticity for users prone to weak passwords and PINs, which may be common to multiple users or easily shared. Fingerprints and iris patterns, however, are difficult to share or replicate (but not impossible). Unique identifiers are a necessary element for many applications, such as payments or access to secure spaces, making biometry the preferred choice.
Technological advances have brought down the cost of components so that biometric authentication is now possible in a wide range of implementations. Consider Delta Air Lines, which offers an optional biometric check-in process to their fliers from curb to gate, saving passengers nine minutes per flight.
Hackers can try to break into your device or accounts by watching you as you enter your PIN code or unlock pattern. This is known as a shoulder surfing attack. Biometric authentication can help you be more resistant to this type of attack.
Risks associated with biometric authentication
Sometimes the submission of biometrics to a data controller is required as a condition for receiving services or benefits, which begs the question: What is the cost of such convenience? The use of biometric data in a world where cybercrime is at an all-time high naturally comes with risks. Here are some of them:
Vulnerability to data breaches
It is well established that organizations that collect and store users’ personal data are under constant threat from hackers. Even as Delta collects biometric information about its passengers, the airline sector has been plagued by data breaches.
Because biometric data is irreplaceable, corporations need to treat it with the utmost caution. If one’s password or PIN were to be compromised, there is always the possibility of resetting it. But the same cannot be said for one’s face, fingerprints, or irises.
Tracking and permanent digital records
Biometric authentication is still in its early stages, yet it already poses serious questions about privacy. When biometrics are stored server-side, particularly in jurisdictions subject to surveillance and secret warrants, you risk leaving a permanent digital record or potential tracking by government authorities.
For instance, it is well known that during the recent Hong Kong protests, the government used facial recognition to track protesters. As CCTV proliferates, your biometric data can become a permanent digital tag that authorities can use to identify and track you for the rest of your life.
Biometric authentication methods often rely on partial information — i.e., a finite number of data points — to authenticate your identity. For example, in 2018, a team from New York University trained an AI neural network to fraudulently crack fingerprint authentication at a success rate of 20%. They relied on the fact that most fingerprint scanners only scan a portion of the finger. Common elements can be used to fool them into mistaken authentication in a manner similar to a dictionary attack.
To counter false authentication, such as unlocking Face ID when the user is asleep, Apple uses “liveness” detection. While Face ID stood up well against the 3D-printed head hack that beat several Android devices, researchers eventually managed to find a way around it.
Bias and inaccuracy
Not all facial recognition models are created equal, and even the best of them aren’t perfect. For example, the OnePlus 6 face unlock feature relies on the front camera and isn’t as secure as the Oppo Find X or Huawei Mate 20 Pro, which use 3D Infrared depth mapping.
Even Apple’s Face ID, which builds a 3D depth map of your entire face using a 30,000-point dot matrix, left the company red-faced when it failed to tell apart a Chinese woman from her colleague, and subsequently a Chinese boy from his mother, among others. Apple was slammed for racial bias, indicating that they need to include more factors to perfect such features.
How ProtonMail applies biometry
Because biometric authentication is inherently risky, Proton does not use it for account login. To access your Proton account, you must provide your password.
We also recommend turning on two-factor authentication (2FA), which requires you to enter an additional piece of information — a time-based, one-time password generated by an app on a device you own — before accessing your account. With 2FA enabled, even if your password is compromised, a hacker cannot log in to your account without also gaining access to your device.
Once you log in to your account, you may choose to add an extra layer of protection to your ProtonMail app in your app settings. In both iOS and Android, you can choose to lock the app and require a PIN code or biometric authentication after the app has been unused for a given amount of time. This provides both extra security along with convenience in a relatively low-risk scenario (i.e., you already have an active session on your device). Authentication takes place locally, so no biometric data is ever sent to our servers.