Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Forget Passwords: Access Your Phone By Identifying Pics of Familiar Faces

b2ap3_thumbnail_facial_recognition_400.jpgWith all the hacking attacks we’ve seen in the news, it’s painfully obvious that using passwords just isn't enough to protect our information. We now have more security measures available than ever before. One of the more unique and effective solutions to have surfaced is Facelock, a clever solution that grants access based on how well you can identify images of your friends and family.

What makes Facelock unique is that it taps directly into your personal memories. By displaying a series of images of people that only you know, in a randomly generated order and with faces scattered in different positions, access is not dependent on a code or a string of characters (which hackers have become skilled at bypassing). Instead, for a hacker to be successful, they will have to tap into your memories, a technology that only exists in science fiction.

You might be thinking, “Okay, what if the device is picked up by a close friend who knows all of the same people that I know?” First off, if they truly are a close friend, they wouldn’t be a jerk and hack into your phone. Second, it’s rare for 100 percent of a person’s friends to be the same. After all, even your spouse had a life before they met you, which included many people whom you’ve never been introduced to.

As secure as Facelock is, a hacker who’s familiar with your social circles does have a better chance at accessing your Facelock-enabled device. In a study of Facelock’s effectiveness, 6.6 percent of hackers who knew the victim were able to successfully bypass Faceflock. Hackers who didn’t know their victims had a less than one percent success rate. Overall, when the two groups were combined, the study showed that Facelock had a 97.5 percent success rate. Additionally, the study showed that would-be hackers who didn’t know the people in the images had a difficult time distinguishing multiple pictures of the same person if they didn’t have a prominent facial feature (like a big nose or a large forehead).

The advantage of Facelock is that you never again have to worry about forgetting your password. However, one disadvantage is that it might not work for your business technology because it will require your IT support team to be familiar with the user’s circle of friends. Plus, for someone who knows you very, very well, hacking into your device may be as easy as playing the classic board game “Guess Who,” minus the fun.

Does Facelock seem like the perfect solution to forgetting your password? Would you trust those who are familiar with your circle of family and friends enough to leave them alone with a Facelock-protected smartphone? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones IT Support Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Tech Term Saving Money Holiday Gadgets Chrome Virtualization Social Media Managed IT Services Microsoft Office Managed Service Automation Cybercrime Operating System Artificial Intelligence Computers Facebook BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi Covid-19 Managed Service Provider Spam Alert Office 365 Telephone Systems Information Information Technology Remote Recovery Employer-Employee Relationship Bandwidth Router BDR Social Engineering Mobility Applications Application Human Resources Law Enforcement Big Data Remote Monitoring Password App History Money Mobile Computing Data Breach Encryption Government Remote Computing How To Mobile Office Private Cloud Managed IT Blockchain Paperless Office Data Storage Patch Management Apps Office Tips Training VPN Google Drive Settings Data Security Two-factor Authentication Avoiding Downtime Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Flexibility Vulnerability Windows 7 Marketing Wireless Word WiFi IT solutions Entertainment Infrastructure Voice over Internet Protocol Servers Website Gmail Budget Safety USB HIPAA Sports Redundancy Firewall Keyboard Vendor Data Protection Virtual Reality Apple Managed Services Display Social User Error Employee/Employer Relationship Meetings Save Time RMM Software as a Service Conferencing Telephone System Staff Risk Management Cleaning Machine Learning Hacker Scam Connectivity Remote Work The Internet of Things Lithium-ion battery End of Support Education Physical Security Vendor Management Unsupported Software Help Desk Customer Service Environment Printing Augmented Reality Charger Fraud PDF IT Consultant Fax Server Remote Worker Compliance Computer Care Managed Services Provider OneNote Proactive IT Humor Current Events Cryptocurrency SaaS Telephony Database Best Practice Samsung YouTube Remote Workers Black Market Network Congestion Comparison Value eWaste Processor CES Document Management Spam Blocking Electronic Medical Records Wireless Technology Solid State Drive Hard Drive How to Downtime Business Technology Content Management Hiring/Firing Access Control Wearable Technology Hard Drives Computing Data storage Virtual Assistant Retail Authentication Instant Messaging Automobile Virus Robot Excel Unified Threat Management Biometrics Computing Infrastructure Computer Accessories Business Intelligence Going Green Virtual Desktop Update Digital Signage Worker Audit IT Management DDoS Google Docs Battery SharePoint Identity Theft Botnet Shadow IT Printer IT Plan Legal Bluetooth Procurement Net Neutrality Workplace Strategy Internet Exlporer Employee/Employer Relationships IBM Password Management Password Manager Employees Windows 365 Multi-Factor Security Flash ISP Notifications Smart Technology Twitter Antivirus Video Conferencing ROI Search Engine Bitcoin Software Tips Shortcuts Supercomputer NIST Business Mangement Sales Windows 8 Point of Sale Trending Personal Sync Relocation Cryptomining Emails Smart Tech IT service Addiction Amazon Supply Chain Management Batteries Recycling Monitoring Tablet Video Games Windows 8.1 Worker Commute Digitize Netflix Wiring Two Factor Authentication Practices Domains Cache Amazon Web Services Experience Windows Server 2008 R2 Root Cause Analysis Scalability HBO Knowledge Safe Mode IaaS Music Criminal Maintenance Customer relationships Email Best Practices Bloatware Business Owner IT Assessment Skype Consultant Manufacturing GDPR Hosted Computing NarrowBand Analytics Wireless Internet Online Shopping Data loss Tablets Search Managed IT Service Outlook Security Cameras Leadership File Sharing Troubleshooting Computer Tips Virtual CIO Specifications Entrepreneur OneDrive Start Menu iPhone Best Available Biometric Security Camera Inventory Loyalty Wire Evernote Peripheral WIndows 7 Screen Mirroring Using Data Frequently Asked Questions Books Shortcut Digital Security Cameras Travel Millennials Cost Management Copiers Mobile Files 5G Windows 10s Printers Chromecast Smart Office Wireless Charging Social Networking Quick Tip Cast Tip of the week Smartwatch webinar Emergency Ergonomics Workforce Development Professional Services Colocation OLED Public Cloud Virtual Private Network Uninterrupted Power Supply Employer Employee Relationship PowerPoint Assessment Running Cable Windows Media Player Cables PCI DSS User Virtual Machine Memory Fiber Optics Windows Server 2008 Monitor Employee 2FA Nanotechnology Telecommuting Messaging Tools Cabling Project Management Television Cortana Policy Managing Stress Hypervisor Trend Micro Reputation Streaming Media Digital Signature Dark mode Content SMS Default App Warranty Tech Support Cameras Laptop Public Computer HVAC Google Apps Procedure Science Techology Saving Time Shopping Regulations Customers Google Search Transportation Analysis dark theme Rootkit Devices Audiobook AI IT Infrastructure Computer Fan Administrator Touchpad Bing Enterprise Content Management Distributed Denial of Service Customer Relationship Management FinTech Analyitcs Social Network Workers MSP Benefits Accountants Thought Leadership Credit Cards Programming Politics Advertising Investment FENG Microchip Printer Server

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code