Difference between revisions of "Touch ID"

From SI410
Jump to: navigation, search
(Added links for Motorola and Fujitsu)
(User Accessibility Concerns)
 
(36 intermediate revisions by 4 users not shown)
Line 2: Line 2:
 
{{Nav-Bar|Topics##}}<br>
 
{{Nav-Bar|Topics##}}<br>
  
'''Touch ID''' was first made by [https://en.wikipedia.org/wiki/Apple_Inc. Apple Inc.] as a fingerprint recognition security feature on iPhones. It was used to unlock iPhones, make purchases on the Apple Store, and use Apple Pay. Touch ID was first introduced in 2013 with the iPhone 5S, and over time, Touch ID was improved and added to even more Apple products. Although the Touch ID is still used and incorporated in many Apple products today, Face ID, a facial recognition security feature, is used a lot in the new Apple phones. Face ID was introduced in 2017 with the iPhone X and created quite the commotion among many Apple product users.
+
'''Touch ID''' was first made by [https://www.apple.com/sitemap/. Apple Inc.] as a fingerprint recognition security feature on iPhones. It was used to unlock iPhones, make purchases on the Apple Store, and use Apple Pay. Touch ID was first introduced in 2013 with the iPhone 5S, and over time, Touch ID was improved and added to even more Apple products. Although the Touch ID is still used and incorporated in many Apple products today, Face ID, a facial recognition security feature, is used a lot in the new Apple phones. Face ID was introduced in 2017 with the iPhone X and created quite the commotion among many Apple product users.
  
Touch ID works by using a sensor to pass a small current to the user's finger and create a 'fingerprint map'. This map is then stored in a chip in your phone so hackers cannot externally access that information.
+
Touch ID works by using a sensor to pass a small current to the user's finger and create a 'fingerprint map'. This map is then stored in a chip in your phone. This way hackers cannot externally access that information.
  
 
== History ==
 
== History ==
  
=== History Behind FingerPrints ===
+
=== History Behind Fingerprints ===
  
Fingerprints are tiny patterns on the tip of our fingers that are completely unique to each person. No two people have ever been found to have the same fingerprints, so they are seen as one of the most secure ways to verify people. Another reason fingerprints are considered a highly secure feature is that they don't change with age and are easily collected from people. The use of fingerprints as a security feature has been most commonly utilized by state prisons, police stations, and even the FBI<ref>Watson, Stephanie (2021). [https://science.howstuffworks.com/fingerprinting.htm "How Fingerprinting Works"] ''howstuffworks''.</ref>.
+
[[File:TouchID2nd.png|300px|thumb|right|Touch ID Setup on Mac<ref>"Use Touch ID on Mac" Apple Support. Web. 17 Apr. 2021. https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac</ref>]] Fingerprints are tiny patterns on the tip of our fingers that are completely unique to each person. No two people have ever been found to have the same fingerprints, so they are seen as one of the most secure ways to verify people. Another reason fingerprints are considered a highly secure feature is that they don't change with age and are easily collected from people. Fingerprints form from a result of DNA and environmental factors starting from a baby’s development in the womb. Environmental factors that can affect a person’s fingerprint are as subtle as the nutrition received, umbilical cord length, position in the womb, and blood pressure. Because of this, even identical twins with the same DNA have never been found to have identical fingerprints. <ref> “Why Twins Don’t Have Identical Fingerprints.” Parenthood, Healthline, 4 Jan. 2019, www.healthline.com/health/do-identical-twins-have-the-same-fingerprints. </ref> The use of fingerprints as a security feature has been most commonly utilized by state prisons, police stations, and even the FBI<ref>Watson, Stephanie (2021). [https://science.howstuffworks.com/fingerprinting.htm "How Fingerprinting Works"] ''howstuffworks''.</ref>. The FBI and police use fingerprints to identify suspects and solve different crimes where fingerprints can be found at the scene. Often they use fingerprint identification to decide sentences, probation, and paroles. The way they find fingerprints is often through chemical techniques and then find matches through online programs<ref>The Scientific Research Honor Society (2021). [https://www.americanscientist.org/article/crime-scene-chemistry-fingerprint-analysis#:~:text=Law%20enforcement%20has%20relied%20on,%2C%20probation%2C%20and%20parole%20decisions "Crime Scene Chemistry: Fingerprint Analysis"] ''American Scientist''.</ref>.
 
+
==== Uses Outside Phones ====
+
 
+
The FBI and police use fingerprints to identify suspects and solve different crimes where fingerprints can be found at the scene. Often they use fingerprint identification to decide sentences, probation, and paroles. The way they find fingerprints is often through chemical techniques and then find matches through online programs<ref>The Scientific Research Honor Society (2021). [https://www.americanscientist.org/article/crime-scene-chemistry-fingerprint-analysis#:~:text=Law%20enforcement%20has%20relied%20on,%2C%20probation%2C%20and%20parole%20decisions. "Crime Scene Chemistry: Fingerprint Analysis"] ''American Scientist''.</ref>.
+
  
 
=== History Behind TouchID ===
 
=== History Behind TouchID ===
In 2012, Apple bought [https://en.wikipedia.org/wiki/AuthenTec AuthenTec] for $356 million and used their technology to build the Touch ID sensors on the iPhone 5S. Once the Touch ID feature was finished and perfected, it wasn't long before companies like [https://en.wikipedia.org/wiki/Motorola Motorola] and [https://en.wikipedia.org/wiki/Fujitsu Fujitsu] tried to potentially buy out Apple, but Apple eventually won. In 2013, the iPhone 5S came out with a Touch ID protocol for their iPhones which was used only to unlock the phone. Simply resting your finger on the sensor area will automatically read the fingerprint. In certain scenarios, like rebooting the phone, Touch ID is disabled and the user's numerical passcode is required<ref>Apple Inc. (October, 2014). [https://web.archive.org/web/20150319073804/https://www.apple.com/business/docs/iOS_Security_Guide.pdf "IOS Security"] ''IOS Security''.</ref>. A year later, when the iPhone 6 and 6 Plus were released, Touch ID was able to not only unlock the phone, but could be used to make purchases in the App Store, iTunes, and Apple Pay. The Touch ID technology is now on 6S, 6S Plus, 7, 7 Plus, 8, 8 Plus, SE (2nd generation), MacBook Pro, MacBook Air, iPad Pro, and iPad Air. With the more recent Touch ID, you can choose to show details about your notifications only after your fingerprint is read. This way other people who look at your phone can't read your notifications if your iPhone is locked. Now with Facial Recognition rising, it seems that Touch ID's time might be slowly coming to an end. However, its impact on our technological advancements has been revolutionary in the field of technology<ref>Dormehl, Luke (July 28, 2020). [https://www.cultofmac.com/440033/today-in-apple-history-apple-acquires-the-company-behind-id/ "Today in Apple history: Apple acquires the company behind Touch ID"] ''Cult of Mac''.</ref>.
 
  
[[File:TouchID2nd.png|300px|thumb|right|Touch ID Setup on Mac]]
+
In 2012, Apple bought [https://www.reuters.com/article/us-authentec-acquisition-apple/apple-buys-mobile-security-firm-authentec-for-356-million-idUSBRE86Q0KD20120727 AuthenTec] for $356 million and used their technology to build the Touch ID sensors on the iPhone 5S. Once the Touch ID feature was finished and perfected, it wasn't long before companies like [https://www.motorola.com/us/?ds_rl=1242193&ds_rl=1242196&gclid=CjwKCAjwjuqDBhAGEiwAdX2cj0qTp-UoPkRhZ-8y5qAIgVRZKaE0hsW-lAIckw1vQ9-2GFLGXA9o4RoCn3cQAvD_BwE&gclsrc=aw.ds Motorola] and [https://www.fujitsu.com/us/ Fujitsu] tried to potentially buy out Apple, but Apple eventually won. In 2013, the iPhone 5S came out with a Touch ID protocol for their iPhones which was used only to unlock the phone. Simply resting your finger on the sensor area will automatically read the fingerprint. In certain scenarios, like rebooting the phone, Touch ID is disabled and the user's numerical passcode is required<ref>Apple Inc. (October, 2014). [https://web.archive.org/web/20150319073804/https://www.apple.com/business/docs/iOS_Security_Guide.pdf "IOS Security"] ''IOS Security''.</ref>. A year later, when the iPhone 6 and 6 Plus were released, Touch ID was able to not only unlock the phone, but could be used to make purchases in the App Store, iTunes, and Apple Pay. The Touch ID technology is now on 6S, 6S Plus, 7, 7 Plus, 8, 8 Plus, SE (2nd generation), MacBook Pro, MacBook Air, iPad Pro, and iPad Air. With the more recent Touch ID, you can choose to show details about your notifications only after your fingerprint is read. This way other people who look at your phone can't read your notifications if your iPhone is locked. Now with Facial Recognition rising, it seems that Touch ID's time might be slowly coming to an end. However, its impact on our technological advancements has been revolutionary in the field of technology<ref>Dormehl, Luke. (July 28, 2020). [https://www.cultofmac.com/440033/today-in-apple-history-apple-acquires-the-company-behind-id/ "Today in Apple history: Apple acquires the company behind Touch ID"] ''Cult of Mac''.</ref>.
 +
 
 
==== The Chip ====
 
==== The Chip ====
  
The Fingerprint data was first stored in the Apple A7 chip in the iPhone 5S, but with new phones came new chips. They are now stored inside the Apple A8, A8X, A9, A9X, A10, A10X, A11, A12, A13, and A14 processors in the iPhones and in the T1 and T2 in the MacBook Pro and MacBook Air. Contrary to popular belief, the fingerprints are not stored in iCloud or any place outside the physical iPhone itself.
+
The Fingerprint data was first stored in the Apple A7 chip in the iPhone 5S, but with new phones came new chips. They are now stored inside the Apple A8, A8X, A9, A9X, A10, A10X, A11, A12, A13, and A14 processors in the iPhones and the T1 and T2 in the MacBook Pro and MacBook Air. Contrary to popular belief, the fingerprints are not stored in iCloud or any place outside the physical iPhone itself. [[File:FindPhone.png|230px|thumbnail|right|Image of Find my iPhone<ref>"Locate a Device in Find My on IPhone." Apple Support. Web. 08 Apr. 2021. https://support.apple.com/guide/iphone/locate-a-device-iph09b087eda/ios</ref>]]
  
 
==== Apple and Anti-theft technology ====
 
==== Apple and Anti-theft technology ====
  
As one of the leading technology companies, Apple has invested heavily in anti-theft technology. If an Apple device is lost or stolen, touch ID and Find My iPhone work together to offer additional protection against theft<ref>https://support.apple.com/en-us/HT204587</ref>. If the iPhone owner realizes their device is missing, there are numerous ways to lock and locate it. Without the iCloud account info, passcode, or touch ID, it is impossible to get into the device unless you have the original box and the iPhone's serial number. If the owner can't locate an iPhone, you can remotely erase your devices to protect their information.
+
As one of the leading technology companies, Apple has invested heavily in anti-theft technology. If an Apple device is lost or stolen, touch ID and [https://www.apple.com/icloud/find-my/ Find My iPhone] work together to offer additional protection against theft<ref>Apple Inc. (2021). [https://support.apple.com/en-us/HT204587 "About Touch ID advanced security technology"] ''Apple Inc''.</ref>. If the iPhone owner realizes their device is missing, there are numerous ways to lock and locate it. Without the iCloud account info, passcode, or touch ID, it is impossible to get into the device unless you have the original box and the iPhone's serial number. If the owner can't locate an iPhone, you can remotely erase your devices to protect their information.
  
Essentially, Apple has created a general culture that their products, especially their most popular product, iPhones, can't be stolen effectively. This process has coined the term [https://mpdc.dc.gov/page/stolen-smart-phone-brick-it "brick"] for iPhones that have been stolen and locked. Unless the original owner deactivates the security protocols and unlocks the devices, it has no viable use other than spare parts.<ref>Srinivasan, Avinash, and Jie Wu. "SafeCode–safeguarding security and privacy of user data on stolen iOS devices." International Symposium on Cyberspace Safety and Security. Springer, Berlin, Heidelberg, 2012.</ref>
+
Essentially, Apple has created a general culture that their products, especially their most popular product, iPhones, can't be stolen effectively. This process has coined the term [https://mpdc.dc.gov/page/stolen-smart-phone-brick-it "brick"] for iPhones that have been stolen and locked. Unless the original owner deactivates the security protocols and unlocks the devices, it has no viable use other than spare parts.<ref>Srinivasan, Avinash, and Wu, Jie. (2012). [https://link.springer.com/chapter/10.1007/978-3-642-35362-8_2 "SafeCode–safeguarding security and privacy of user data on stolen iOS devices"] ''International Symposium on Cyberspace Safety and Security''.</ref>
  
 
However, hackers are becoming more advanced by the day, and while it is implausible that a stolen phone would end up in a hacker's hands, it is possible.  
 
However, hackers are becoming more advanced by the day, and while it is implausible that a stolen phone would end up in a hacker's hands, it is possible.  
Line 35: Line 31:
  
 
===Why Do People Use Touch ID===
 
===Why Do People Use Touch ID===
People use Touch ID for many different reasons.  First, Touch ID allows users to quickly unlock their phones.  Before Touch ID, in order to unlock a locked phone, users would need to enter a passcode.  This passcode was either a combination of numbers (a PIN) or a combination of characters selected from the alphabet and symbols (periods, question marks, etc.)<ref>Cherapau, Ivan, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. "On the Impact of Touch ID on IPhone Passcodes." 2015 Symposium on Usable Privacy and Security (2015). Print.</ref>.  It was found that users spend a significant amount of their overall device time entering in their passcode<ref>De Luca, Alexander, Alina Hang, Emanuel Von Zezschwitz, and Heinrich Hussmann. "I Feel Like I'm Taking Selfies All Day!" Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (2015). Print.</ref>.  So, by utilizing Touch ID, users spend less time entering in that information as all they need is their fingerprint.  And, Touch ID can unlock a user's phone in seconds.  Second, multiple fingerprints can be stored with Touch ID<ref>Bud, Andrew. "Facing the Future: The Impact of Apple FaceID." Biometric Technology Today 2018.1 (2018): 5-7. Print.</ref>.  This makes Touch ID easier to use in that if a user can’t use the original finger that Touch ID was set up with (maybe they broke a finger or it’s dirty) they can use another one of their fingers<ref name="Ahmad">A., Ahmad, Diana Al, Hadeel Al, and Nada Hamad. "Effectiveness of Iphone’s Touch ID: KSA Case Study." International Journal of Advanced Computer Science and Applications 6.1 (2015). Print.</ref>.  In addition, using Touch ID can be more convenient for users.  Not only does using Touch ID require very little attention from users as compared to entering in a passcode <ref name="Ahmad"></ref>, Touch ID makes other features of the phone more convenient and easier to use, as well.  For example, when a user purchases something from the App Store, instead of having to re-enter their passcode as was previously required, users can simply place their finger on the scanner and use Touch ID<ref name="Ahmad"></ref>.  And, finally, using Touch ID gives users peace of mind that hackers will have a more difficult time getting into their phones and accessing their information<ref name="Ahmad"></ref>.  Because a person’s fingerprint is unique to them, it will be hard, if not impossible, for someone to recreate it.  So, essentially, Touch ID is providing users with a stronger passcode completely unique to them, that doesn’t change over time.
+
 
 +
People started using Touch ID because it allows users to quickly unlock their phones.  Before Touch ID, to unlock a locked phone, users would need to enter a passcode.  This passcode was either a combination of numbers (a PIN) or a combination of characters selected from the alphabet and symbols (periods, question marks, etc.)<ref>Cherapau, Ivan, and Muslukhov, Ildar, and Asanka, Nalin, and Beznosov, Konstantin. (2015).[https://www.usenix.org/conference/soups2015/proceedings/presentation/cherapau "On the Impact of Touch ID on iPhone Passcodes"] ''Symposium on Usable Privacy and Security''.</ref>.  It was found that users spend a significant amount of their overall device time entering in their passcode<ref>De Luca, Alexander, and Hang, Alina, and Von Zezschwitz, Emanuel, and Hussmann, Heinrich. (2015). [https://dl.acm.org/doi/10.1145/2702123.2702141 "I Feel Like I'm Taking Selfies All Day!"] ''Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems''.</ref>.  So, by utilizing Touch ID, iPhones could be more efficient to users and all they need is their fingerprint.  And Touch ID can unlock a user's phone in seconds.  Additionally, multiple fingerprints can be stored with Touch ID<ref>Bud, Andrew. (2018). [https://www.sciencedirect.com/science/article/abs/pii/S0969476518300109 "Facing the Future: The Impact of Apple FaceID"] ''Biometric Technology Today''.</ref>.  This makes Touch ID easier to use in that if a user can’t use the original finger that Touch ID was set up with (maybe they broke a finger or it’s dirty) they can use another one of their fingers/fingerprints they set up<ref name="Ahmad">Ahmad, Diana Al, and Al, Hadeel, and Hamad, Nada. (2015). [https://thesai.org/Publications/ViewPaper?Volume=6&Issue=1&Code=IJACSA&SerialNo=22 "Effectiveness of Iphone’s Touch ID: KSA Case Study"] ''International Journal of Advanced Computer Science and Applications''.</ref>.  In addition, when a user purchases something from the App Store, instead of having to re-enter their passcode as was previously required, users can simply place their finger on the scanner and use Touch ID<ref name="Ahmad"></ref>.  And, finally, using Touch ID gives users peace of mind that hackers will have a more difficult time getting into their phones and accessing their information<ref name="Ahmad"></ref>.  Because a person’s fingerprint is unique to them, it will be hard, if not impossible, for someone to recreate it.  So, essentially, Touch ID is providing users with a stronger passcode unique to them, that doesn’t change over time.
 +
 
 +
===Various Usage of Touch ID===
 +
 
 +
The most commons usage is to unlock your iPhone, iPad, or MacBook devices. However, this function is banned when the user hasn't been using his or her device for 8 hours. In this situation, the user must self-enter the password. Apart from that, Touch ID can also be applied to various scenes. According to Apple, Touch ID can be used to make purchases in App Store and set for Apple Pay. Additionally, if the individual app supports Touch ID, it can also be used to unlock or make purchases on that app. <ref> Apple [https://support.apple.com/en-us/HT201371 Use Touch ID on iPhone and iPad] </ref> In Apple's Autofill function, which auto-fills the account and password for users, the user needs to first verify their identity using Touch ID. [[File:Applepay.jpg|350px|thumbnail|right|Apple Pay]] The idea of fingerprint biometric locks has been expanded upon into many different products. Many shackle locks are now designed to program the owner’s fingerprint and unlock with it. This design feature eliminates the need for a key and core system and likewise eliminates the possibility for the lock to be picked. Other locks designed with a deadbolt for home door security combine the idea of an electronic lock with fingerprint technology. The internal hardware allows the entering of a passcode as well as a fingerprint to unlock, just like a smartphone. <ref> “Biometric - Keyless Door Locks - Door Locks.” The Home Depot, www.homedepot.com/b/Hardware-Door-Hardware-Door-Locks-Keyless-Door-Locks/Biometric/N-5yc1vZc2bdZ1z1pm1g. </ref> Other examples are lockboxes. These lockboxes can be intended for a variety of applications like gun locks and security safes. Fingerprint gun lockboxes allow users to access their firearms quicker than entering a password. Fingerprint trigger locks provide the same utility. <ref> “10 Best Biometric Gun Safes In 2021.” Gun Reviews and Buying Guides, 28 Jan. 2021, robarguns.com/biometric-gun-safe. </ref>
 +
 
 +
====Electronic Payment====
 +
 
 +
Countries like China have been using their smartphones as vessels for payment. In Shanghai, almost everywhere you go people pay with their phones. It is so common that even all the street vendors have QR codes that take smartphones can scan for payment. Some places do not even take cash payments. Now a shopper can leave home with just their phone. Touch ID, Face ID, or password allows a person to unlock a phone and use any credit cards associated with the phone. The development of new facial technology is also starting to appear in China. Users with the newest iPhone can simply scan their faces and confirm their payment. <ref> World Leaders in Research-Based User Experience. “Case Study of Facial-Recognition Payment in China.” Nielsen Norman Group, 10 May 2020, www.nngroup.com/articles/face-recognition-pay/. </ref> In the US the development of Apple Pay and Samsung Pay is also gaining in popularity.
 +
 
 +
===Touch ID or Face ID===
 +
 
 +
When Apple launched iPhone X, Apple first introduces Face ID. In the following generations of iPhone or iPad Pro, Apple gradually replaces Touch ID with Face ID. However, Touch ID is still widely used in Apple's product line. Currently, the newest generation of iPad Air, MacBook Pro, and MacBook Air are still using Touch ID. According to Apple, the probability that a random person in the population could look at your iPhone or iPad Pro and unlock it using Face ID is approximately 1 in 1,000,000. <ref> Apple [https://support.apple.com/en-us/HT208108 "About Face ID Advanced Technology"] </ref> In comparison, the probability for Touch ID is 1 in 50,000. Apple says Face ID is a huge improvement in security. However, the actual experience differs in different situations. For example, when a person is wearing gloves, Touch ID would not work because no distortion is generated in the button's electrostatic field. <ref> William Judd [https://www.mobilefun.co.uk/blog/2016/09/psa-the-iphone-home-button-wont-work-with-gloves/ "The iPhone home button won’t work with gloves"] </ref> However, under the COVID-19 global pandemic where everyone has to wear masks, Touch ID is easier because one does not need to put his mask off. However, according to BBC, Apple will make Face ID work with masks in the newest update iOS 14.5. <ref>  [https://www.bbc.com/news/technology-55904562 "Apple Face ID to work for mask wearers] BBC News</ref>
  
 
== Ethical Dilemmas ==
 
== Ethical Dilemmas ==
  
 
=== Access To Our Information ===
 
=== Access To Our Information ===
One of the ethical issues that arise with biometric fingerprinting is the right to privacy. For instance, “Biometric data are personally-identifying information. Thus biometric systems have the potential to collect not only pattern recognition information captured by sensors, but also other information that can be associated with the biometric data themselves or with data records already contained within the system.”<ref>“Read ‘Biometric Recognition: Challenges and Opportunities’ at NAP.edu.” National Academies Press: OpenBook, www.nap.edu/read/12720/chapter/6#111.</ref> As a result, the problem arises with what data should be stored and for what purposes. This dilemma gets even more complicated when private companies are allowed to collect your information. For instance, “The GPS Act permits service providers to collect geolocation information in the normal course of business”<ref>“GPS Act.” U.S. Senator Ron Wyden of Oregon, www.wyden.senate.gov/priorities/gps-act.</ref>. Hence, it has become ever more important to know what information is being sent and collected about the user while accessing laptops, phones, smartwatches, etc.
 
  
As a follow-up to the concerns mentioned above, the issue arises here regarding informed consent of the user in terms of what they are signing up for because understanding what you are signing up for before giving away sensitive information is an important aspect of a person’s privacy right. “In general, adults are considered to have sufficient ability to understand information. The problem is mainly the child’s informed consent when using biometrics  (24).  Similar informed consent issues also come from vulnerable populations such as the elderly, mentally ill, and poorly understood people”<ref>(PDF) Ethical Issues in Biometrics.” ResearchGate, www.researchgate.net/publication/335768067_Ethical_Issues_in_Biometrics.</ref>. Therefore, understanding the terms and conditions before signing up has become important in today’s world.
+
One of the ethical issues that arise with biometric fingerprinting is the right to privacy. For instance, “Biometric data are personally identifying information. Thus biometric systems have the potential to collect not only pattern recognition information captured by sensors, but also other information that can be associated with the biometric data themselves or with data records already contained within the system.”<ref>National Research Council. (2010). [www.nap.edu/read/12720/chapter/6#111 “Read ‘Biometric Recognition: Challenges and Opportunities’ at NAP.edu.”] ''National Academies Press: OpenBook''.</ref> As a result, the problem arises with what data should be stored and for what purposes. This dilemma gets even more complicated when private companies are allowed to collect your information. For instance, “The GPS Act permits service providers to collect geolocation information in the normal course of business”<ref>U.S. Senator Ron Wyden of Oregon. [www.wyden.senate.gov/priorities/gps-act “GPS Act”] ''Ron Wyden United States Senator for Oregon''.</ref>. Hence, it has become ever more important to know what information is being sent and collected about the user while accessing laptops, phones, smartwatches, etc.
  
One of the steps that Apple has taken recently to address some of the issues regarding the storage and retrieval of sensitive information is the use of tokens. For instance, “With Apple Pay, your exact credit card information is never sent over the internet. Instead, a token or random string of numbers representing the card is sent. Biometric tokenization is similar, but it's your biometric data, rather than credit card info, that is obfuscated and transmitted.”<ref>Simic, Bojan. “Council Post: The Promise And Challenges Of Biometrics.” Forbes, Forbes Magazine, 25 Sept. 2017, www.forbes.com/sites/forbestechcouncil/2016/12/22/the-promise-and-challenges-of-biometrics/?sh=73359d7c7e6b.</ref>
+
As a follow-up to the concerns mentioned above, the issue arises here regarding informed consent of the user in terms of what they are signing up for because understanding what you are signing up for before giving away sensitive information is an important aspect of a person’s privacy right. “In general, adults are considered to have sufficient ability to understand information.  The problem is mainly the child’s informed consent when using biometrics  (24).  Similar informed consent issues also come from vulnerable populations such as the elderly, mentally ill, and poorly understood people”<ref>Cooper, Isaac. (September 2019). [www.researchgate.net/publication/335768067_Ethical_Issues_in_Biometrics “(PDF) Ethical Issues in Biometrics”] ''ResearchGate''.</ref>. Therefore, understanding the terms and conditions before signing up has become important in today’s world.
 +
 
 +
One of the steps that Apple has taken recently to address some of the issues regarding the storage and retrieval of sensitive information is the use of tokens. For instance, “With Apple Pay, your exact credit card information is never sent over the internet. Instead, a token or random string of numbers representing the card is sent. Biometric tokenization is similar, but it's your biometric data, rather than credit card info, that is obfuscated and transmitted.”<ref>Simic, Bojan. (25 Sept. 2017). [www.forbes.com/sites/forbestechcouncil/2016/12/22/the-promise-and-challenges-of-biometrics/?sh=73359d7c7e6b “Council Post: The Promise And Challenges Of Biometrics”] ''Forbes Magazine''.</ref>
  
 
=== How Secure Is Touch ID? ===
 
=== How Secure Is Touch ID? ===
Touch ID is more secure than Face ID but less secure than person password entering. The question is how much less secure is this more convenient option than typing in your password every time you need to unlock your phone or sign in to an account? Apply claims the uniqueness of an individual's fingerprint makes this system extremely secure but researchers have recently discovered a new way to break this security barrier. Researchers at Michigan State University and New York University have discovered that because the fingerprint scanners on phones are so small, they only read partial fingerprints--making the images easier to duplicate. Touch ID works by taking about ten different images creating ten partial images of your fingerprint from different angles, never creating one full unique fingerprint image.  Therefore, a hacker only needs to match one of these ten partial fingerprint images to unlock the phone.  Through the study, using computer simulations, researchers "were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time.” <ref>Goel, Vindu (April 10, 2017). [http://www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html%20www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html "That Fingerprint Sensor on Your Phone Is Not as Safe as You Think"] ''The New York Times''. </ref> Although this is a concerningly high number, these tests were not done with phones. Instead, they were tested on Touch ID systems not connected to phones, making the realistic percentage of replicated prints much smaller. There is concern about the idea that hackers only need to match one of the ten partial prints to unlock your phone but realistically, this is still a very unlikely and difficult thing to do. Although Touch ID is a very secure system, this study highlights some minor weaknesses it presents that could easily be fixed. Most of the researchers were quoted saying they still use Touch ID to secure their phones, but might suggest users use personal password insertion for more confidential log-ins like bank accounts.
+
 
 +
Touch ID is more secure than Face ID but less secure than password protection. The question is how much sacrificed security is this convenient option than typing in your password every time you need to unlock your phone or sign in to an account? Apple claims the uniqueness of an individual's fingerprint makes this system extremely secure but researchers have recently discovered a new way to break this security barrier. Researchers at Michigan State University and New York University have discovered that because the fingerprint scanners on phones are so small, they only read partial fingerprints--making the images easier to duplicate. Touch ID works by taking about ten different images creating ten partial images of your fingerprint from different angles, never creating one full unique fingerprint image.  Therefore, a hacker only needs to match one of these ten partial fingerprint images to unlock the phone.  Through the study, using computer simulations, researchers "were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time.” <ref>Goel, Vindu (April 10, 2017). [http://www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html%20www.nytimes.com/2017/04/10/technology/fingerprint-security-smartphones-apple-google-samsung.html "That Fingerprint Sensor on Your Phone Is Not as Safe as You Think"] ''The New York Times''. </ref> Although this is a concerningly high number, these tests were not done with phones. Instead, they were tested on Touch ID systems not connected to phones, making the realistic percentage of replicated prints much smaller. There is concern about the idea that hackers only need to match one of the ten partial prints to unlock your phone but realistically, this is still a very unlikely and difficult thing to do. Although Touch ID is a very secure system, this study highlights some minor weaknesses it presents that could easily be fixed. Most of the researchers were quoted saying they still use Touch ID to secure their phones, but might suggest users use personal password insertion for more confidential log-ins like bank accounts. As technology develops and the importance of smartphones increases with linkage to bank accounts and credit cards, touch ID security becomes a greater issue.
  
 
=== User Accessibility Concerns ===
 
=== User Accessibility Concerns ===
Apple has made massive efforts in improving accessibility in recent years. This includes adding categories such as “Vision,” Interaction,” “Hearing,” “Media,” and “Learning” to their “Accessibility” section in their phone settings. However, the release of the iPhone X prompted some concern among the blind/low-vision community <ref> Thompson, Terrill. “iPhone X and Accessibility | AccessComputing.” AccessComputing, 2018, www.washington.edu/accesscomputing/resources/accesscomputing-news-february-2018/iphone-x-and-accessibility. </ref>. The removal of the home button with the additional Touch ID feature posed some complications with those who relied on the physical feeling of the home button to navigate unlocking their phone.
 
  
Luckily, the new Face ID feature has proven to outdo Touch ID at every level in regards to accessibility. First, the set-up process of Face ID is much faster and requires less precision which can be a hindrance to many with limited fine-motor skills. Beyond set-up, Face ID has allowed Apple to make a virtually hands-free experience. The VoiceOver feature has been a vital tool to the blind/low-vision community and this coupled with the Face ID unlocking feature make iPhone products all the more accessible. You still have to occasionally swipe up from the bottom of the screen to the top, but this requires less precision than the former home button/Touch ID as mentioned previously <ref> Aquino, Steven. “What Face ID Means for Accessibility.” Steven’s Blog, 21 Nov. 2017, www.stevensblog.co/blogs/what-face-id-means-for-accessibility. </ref>.
+
Apple has made massive efforts in improving accessibility in recent years. This includes adding categories such as “Vision,” Interaction,” “Hearing,” “Media,” and “Learning” to their “Accessibility” section in their phone settings. However, the release of the iPhone X prompted some concern among the blind/low-vision community <ref> Thompson, Terrill. (2018). [www.washington.edu/accesscomputing/resources/accesscomputing-news-february-2018/iphone-x-and-accessibility “iPhone X and Accessibility | AccessComputing”] ''AccessComputing''. </ref>. The removal of the home button with the additional Touch ID feature posed some complications with those who relied on the physical feeling of the home button to navigate unlocking their phone.
 +
 
 +
Luckily, the new Face ID feature has proven to outdo Touch ID at every level in regards to accessibility. First, the set-up process of Face ID is much faster and requires less precision which can be a hindrance to many with limited fine-motor skills. Beyond set-up, Face ID has allowed Apple to make a virtually hands-free experience. The VoiceOver feature has been a vital tool to the blind/low-vision community and this coupled with the Face ID unlocking feature make iPhone products all the more accessible. You still have to occasionally swipe up from the bottom of the screen to the top, but this requires less precision than the former home button/Touch ID as mentioned previously <ref> Aquino, Steven. (21 Nov. 2017). [www.stevensblog.co/blogs/what-face-id-means-for-accessibility “What Face ID Means for Accessibility”] ''Steven’s Blog''.</ref>.
  
Although Face ID is generally more accessible, there was previous concern with the “look-to-unlock” feature that requires an active gaze would create a barrier. People with visual impairments or blindness find this task difficult or impossible to do. They also don’t naturally hold the phone up to their face when using them. However, Apple thought this through and allows users to disable this feature by going to Settings > Face ID and Passcodes > Required Attention for Face ID <ref> “The iPhone X: What Does Face ID Mean for Accessibility?” Rightpoint, 6 Dec. 2017, www.rightpoint.com/thought/articles/2017/12/06/what-does-x-face-mean. </ref>. Apple does say, “Requiring Attention makes Face ID more secure,” but unlike Touch ID which allows multiple fingerprints to be added, only one face can be entered for Face ID <ref> Ingber, Janet. “The iPhone X for People with Visual Impairments: Face ID, New Gestures, and Useful Commands | AccessWorld | American Foundation for the Blind.” American Foundation for the Blind, Feb. 2018, www.afb.org/aw/19/2/15124. </ref>. Touch ID is not made with accessibility in mind. Apple went a more inclusive route by creating and implementing Face ID instead.
+
Although Face ID is generally more accessible, there was previous concern with the “look-to-unlock” feature that requires an active gaze would create a barrier. People with visual impairments or blindness find this task difficult or impossible to do. They also don’t naturally hold the phone up to their face when using them. However, Apple thought this through and allows users to disable this feature by going to Settings > Face ID and Passcodes > Required Attention for Face ID <ref> RightPoint. (6 Dec. 2017). [www.rightpoint.com/thought/articles/2017/12/06/what-does-x-face-mean “The iPhone X: What Does Face ID Mean for Accessibility?”] ''Rightpoint''.</ref>. Apple does say, “Requiring Attention makes Face ID more secure,” but unlike Touch ID which allows multiple fingerprints to be added, only one face can be entered for Face ID <ref> Ingber, Janet. (Feb. 2018). [www.afb.org/aw/19/2/15124 “The iPhone X for People with Visual Impairments: Face ID, New Gestures, and Useful Commands | AccessWorld | American Foundation for the Blind”] ''American Foundation for the Blind''.</ref>. Touch ID is not made with accessibility in mind. Apple went a more inclusive route by creating and implementing Face ID instead.
  
 +
Touch ID may also not be of use if a person's fingerprint is not identifiable. There are many reasons this could be. For example, wet, wrinkly fingers may not register correctly on Touch ID devices. Medical reasons also may explain the loss of a fingerprint. A 62-year-old man from Singapore was treated for cancer with chemotherapy. He was given the drug capecitabine which led to the peeling of his palms and feet, leaving him temporarily without a fingerprint. US Customs detained him on his travel to visit family in the states and released him after a couple of hours. <ref> Harmon, Katherine. “Can You Lose Your Fingerprints?” Scientific American, Scientific American, 29 May 2009, www.scientificamerican.com/article/lose-your-fingerprints/. </ref>
  
 
==See also==
 
==See also==

Latest revision as of 16:10, 20 April 2021

Touch ID Usage [1]
Back • ↑Topics • ↑Categories

Touch ID was first made by Apple Inc. as a fingerprint recognition security feature on iPhones. It was used to unlock iPhones, make purchases on the Apple Store, and use Apple Pay. Touch ID was first introduced in 2013 with the iPhone 5S, and over time, Touch ID was improved and added to even more Apple products. Although the Touch ID is still used and incorporated in many Apple products today, Face ID, a facial recognition security feature, is used a lot in the new Apple phones. Face ID was introduced in 2017 with the iPhone X and created quite the commotion among many Apple product users.

Touch ID works by using a sensor to pass a small current to the user's finger and create a 'fingerprint map'. This map is then stored in a chip in your phone. This way hackers cannot externally access that information.

History

History Behind Fingerprints

Touch ID Setup on Mac[2]
Fingerprints are tiny patterns on the tip of our fingers that are completely unique to each person. No two people have ever been found to have the same fingerprints, so they are seen as one of the most secure ways to verify people. Another reason fingerprints are considered a highly secure feature is that they don't change with age and are easily collected from people. Fingerprints form from a result of DNA and environmental factors starting from a baby’s development in the womb. Environmental factors that can affect a person’s fingerprint are as subtle as the nutrition received, umbilical cord length, position in the womb, and blood pressure. Because of this, even identical twins with the same DNA have never been found to have identical fingerprints. [3] The use of fingerprints as a security feature has been most commonly utilized by state prisons, police stations, and even the FBI[4]. The FBI and police use fingerprints to identify suspects and solve different crimes where fingerprints can be found at the scene. Often they use fingerprint identification to decide sentences, probation, and paroles. The way they find fingerprints is often through chemical techniques and then find matches through online programs[5].

History Behind TouchID

In 2012, Apple bought AuthenTec for $356 million and used their technology to build the Touch ID sensors on the iPhone 5S. Once the Touch ID feature was finished and perfected, it wasn't long before companies like Motorola and Fujitsu tried to potentially buy out Apple, but Apple eventually won. In 2013, the iPhone 5S came out with a Touch ID protocol for their iPhones which was used only to unlock the phone. Simply resting your finger on the sensor area will automatically read the fingerprint. In certain scenarios, like rebooting the phone, Touch ID is disabled and the user's numerical passcode is required[6]. A year later, when the iPhone 6 and 6 Plus were released, Touch ID was able to not only unlock the phone, but could be used to make purchases in the App Store, iTunes, and Apple Pay. The Touch ID technology is now on 6S, 6S Plus, 7, 7 Plus, 8, 8 Plus, SE (2nd generation), MacBook Pro, MacBook Air, iPad Pro, and iPad Air. With the more recent Touch ID, you can choose to show details about your notifications only after your fingerprint is read. This way other people who look at your phone can't read your notifications if your iPhone is locked. Now with Facial Recognition rising, it seems that Touch ID's time might be slowly coming to an end. However, its impact on our technological advancements has been revolutionary in the field of technology[7].

The Chip

The Fingerprint data was first stored in the Apple A7 chip in the iPhone 5S, but with new phones came new chips. They are now stored inside the Apple A8, A8X, A9, A9X, A10, A10X, A11, A12, A13, and A14 processors in the iPhones and the T1 and T2 in the MacBook Pro and MacBook Air. Contrary to popular belief, the fingerprints are not stored in iCloud or any place outside the physical iPhone itself.
Image of Find my iPhone[8]

Apple and Anti-theft technology

As one of the leading technology companies, Apple has invested heavily in anti-theft technology. If an Apple device is lost or stolen, touch ID and Find My iPhone work together to offer additional protection against theft[9]. If the iPhone owner realizes their device is missing, there are numerous ways to lock and locate it. Without the iCloud account info, passcode, or touch ID, it is impossible to get into the device unless you have the original box and the iPhone's serial number. If the owner can't locate an iPhone, you can remotely erase your devices to protect their information.

Essentially, Apple has created a general culture that their products, especially their most popular product, iPhones, can't be stolen effectively. This process has coined the term "brick" for iPhones that have been stolen and locked. Unless the original owner deactivates the security protocols and unlocks the devices, it has no viable use other than spare parts.[10]

However, hackers are becoming more advanced by the day, and while it is implausible that a stolen phone would end up in a hacker's hands, it is possible.

In this case, Apple has set another safeguard called the Secure Enclave, which Apple developed to protect your passcode and fingerprint data. Meaning touch ID doesn't store any fingerprint images and instead relies only on a mathematical representation. It isn't possible for someone to reverse engineer your actual fingerprint image from this stored data therefore your biometrics are protected.

Why Do People Use Touch ID

People started using Touch ID because it allows users to quickly unlock their phones. Before Touch ID, to unlock a locked phone, users would need to enter a passcode. This passcode was either a combination of numbers (a PIN) or a combination of characters selected from the alphabet and symbols (periods, question marks, etc.)[11]. It was found that users spend a significant amount of their overall device time entering in their passcode[12]. So, by utilizing Touch ID, iPhones could be more efficient to users and all they need is their fingerprint. And Touch ID can unlock a user's phone in seconds. Additionally, multiple fingerprints can be stored with Touch ID[13]. This makes Touch ID easier to use in that if a user can’t use the original finger that Touch ID was set up with (maybe they broke a finger or it’s dirty) they can use another one of their fingers/fingerprints they set up[14]. In addition, when a user purchases something from the App Store, instead of having to re-enter their passcode as was previously required, users can simply place their finger on the scanner and use Touch ID[14]. And, finally, using Touch ID gives users peace of mind that hackers will have a more difficult time getting into their phones and accessing their information[14]. Because a person’s fingerprint is unique to them, it will be hard, if not impossible, for someone to recreate it. So, essentially, Touch ID is providing users with a stronger passcode unique to them, that doesn’t change over time.

Various Usage of Touch ID

The most commons usage is to unlock your iPhone, iPad, or MacBook devices. However, this function is banned when the user hasn't been using his or her device for 8 hours. In this situation, the user must self-enter the password. Apart from that, Touch ID can also be applied to various scenes. According to Apple, Touch ID can be used to make purchases in App Store and set for Apple Pay. Additionally, if the individual app supports Touch ID, it can also be used to unlock or make purchases on that app. [15] In Apple's Autofill function, which auto-fills the account and password for users, the user needs to first verify their identity using Touch ID.
Apple Pay
The idea of fingerprint biometric locks has been expanded upon into many different products. Many shackle locks are now designed to program the owner’s fingerprint and unlock with it. This design feature eliminates the need for a key and core system and likewise eliminates the possibility for the lock to be picked. Other locks designed with a deadbolt for home door security combine the idea of an electronic lock with fingerprint technology. The internal hardware allows the entering of a passcode as well as a fingerprint to unlock, just like a smartphone. [16] Other examples are lockboxes. These lockboxes can be intended for a variety of applications like gun locks and security safes. Fingerprint gun lockboxes allow users to access their firearms quicker than entering a password. Fingerprint trigger locks provide the same utility. [17]

Electronic Payment

Countries like China have been using their smartphones as vessels for payment. In Shanghai, almost everywhere you go people pay with their phones. It is so common that even all the street vendors have QR codes that take smartphones can scan for payment. Some places do not even take cash payments. Now a shopper can leave home with just their phone. Touch ID, Face ID, or password allows a person to unlock a phone and use any credit cards associated with the phone. The development of new facial technology is also starting to appear in China. Users with the newest iPhone can simply scan their faces and confirm their payment. [18] In the US the development of Apple Pay and Samsung Pay is also gaining in popularity.

Touch ID or Face ID

When Apple launched iPhone X, Apple first introduces Face ID. In the following generations of iPhone or iPad Pro, Apple gradually replaces Touch ID with Face ID. However, Touch ID is still widely used in Apple's product line. Currently, the newest generation of iPad Air, MacBook Pro, and MacBook Air are still using Touch ID. According to Apple, the probability that a random person in the population could look at your iPhone or iPad Pro and unlock it using Face ID is approximately 1 in 1,000,000. [19] In comparison, the probability for Touch ID is 1 in 50,000. Apple says Face ID is a huge improvement in security. However, the actual experience differs in different situations. For example, when a person is wearing gloves, Touch ID would not work because no distortion is generated in the button's electrostatic field. [20] However, under the COVID-19 global pandemic where everyone has to wear masks, Touch ID is easier because one does not need to put his mask off. However, according to BBC, Apple will make Face ID work with masks in the newest update iOS 14.5. [21]

Ethical Dilemmas

Access To Our Information

One of the ethical issues that arise with biometric fingerprinting is the right to privacy. For instance, “Biometric data are personally identifying information. Thus biometric systems have the potential to collect not only pattern recognition information captured by sensors, but also other information that can be associated with the biometric data themselves or with data records already contained within the system.”[22] As a result, the problem arises with what data should be stored and for what purposes. This dilemma gets even more complicated when private companies are allowed to collect your information. For instance, “The GPS Act permits service providers to collect geolocation information in the normal course of business”[23]. Hence, it has become ever more important to know what information is being sent and collected about the user while accessing laptops, phones, smartwatches, etc.

As a follow-up to the concerns mentioned above, the issue arises here regarding informed consent of the user in terms of what they are signing up for because understanding what you are signing up for before giving away sensitive information is an important aspect of a person’s privacy right. “In general, adults are considered to have sufficient ability to understand information. The problem is mainly the child’s informed consent when using biometrics (24). Similar informed consent issues also come from vulnerable populations such as the elderly, mentally ill, and poorly understood people”[24]. Therefore, understanding the terms and conditions before signing up has become important in today’s world.

One of the steps that Apple has taken recently to address some of the issues regarding the storage and retrieval of sensitive information is the use of tokens. For instance, “With Apple Pay, your exact credit card information is never sent over the internet. Instead, a token or random string of numbers representing the card is sent. Biometric tokenization is similar, but it's your biometric data, rather than credit card info, that is obfuscated and transmitted.”[25]

How Secure Is Touch ID?

Touch ID is more secure than Face ID but less secure than password protection. The question is how much sacrificed security is this convenient option than typing in your password every time you need to unlock your phone or sign in to an account? Apple claims the uniqueness of an individual's fingerprint makes this system extremely secure but researchers have recently discovered a new way to break this security barrier. Researchers at Michigan State University and New York University have discovered that because the fingerprint scanners on phones are so small, they only read partial fingerprints--making the images easier to duplicate. Touch ID works by taking about ten different images creating ten partial images of your fingerprint from different angles, never creating one full unique fingerprint image. Therefore, a hacker only needs to match one of these ten partial fingerprint images to unlock the phone. Through the study, using computer simulations, researchers "were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time.” [26] Although this is a concerningly high number, these tests were not done with phones. Instead, they were tested on Touch ID systems not connected to phones, making the realistic percentage of replicated prints much smaller. There is concern about the idea that hackers only need to match one of the ten partial prints to unlock your phone but realistically, this is still a very unlikely and difficult thing to do. Although Touch ID is a very secure system, this study highlights some minor weaknesses it presents that could easily be fixed. Most of the researchers were quoted saying they still use Touch ID to secure their phones, but might suggest users use personal password insertion for more confidential log-ins like bank accounts. As technology develops and the importance of smartphones increases with linkage to bank accounts and credit cards, touch ID security becomes a greater issue.

User Accessibility Concerns

Apple has made massive efforts in improving accessibility in recent years. This includes adding categories such as “Vision,” Interaction,” “Hearing,” “Media,” and “Learning” to their “Accessibility” section in their phone settings. However, the release of the iPhone X prompted some concern among the blind/low-vision community [27]. The removal of the home button with the additional Touch ID feature posed some complications with those who relied on the physical feeling of the home button to navigate unlocking their phone.

Luckily, the new Face ID feature has proven to outdo Touch ID at every level in regards to accessibility. First, the set-up process of Face ID is much faster and requires less precision which can be a hindrance to many with limited fine-motor skills. Beyond set-up, Face ID has allowed Apple to make a virtually hands-free experience. The VoiceOver feature has been a vital tool to the blind/low-vision community and this coupled with the Face ID unlocking feature make iPhone products all the more accessible. You still have to occasionally swipe up from the bottom of the screen to the top, but this requires less precision than the former home button/Touch ID as mentioned previously [28].

Although Face ID is generally more accessible, there was previous concern with the “look-to-unlock” feature that requires an active gaze would create a barrier. People with visual impairments or blindness find this task difficult or impossible to do. They also don’t naturally hold the phone up to their face when using them. However, Apple thought this through and allows users to disable this feature by going to Settings > Face ID and Passcodes > Required Attention for Face ID [29]. Apple does say, “Requiring Attention makes Face ID more secure,” but unlike Touch ID which allows multiple fingerprints to be added, only one face can be entered for Face ID [30]. Touch ID is not made with accessibility in mind. Apple went a more inclusive route by creating and implementing Face ID instead.

Touch ID may also not be of use if a person's fingerprint is not identifiable. There are many reasons this could be. For example, wet, wrinkly fingers may not register correctly on Touch ID devices. Medical reasons also may explain the loss of a fingerprint. A 62-year-old man from Singapore was treated for cancer with chemotherapy. He was given the drug capecitabine which led to the peeling of his palms and feet, leaving him temporarily without a fingerprint. US Customs detained him on his travel to visit family in the states and released him after a couple of hours. [31]

See also

References

  1. “How to Set up Touch ID on Your IPhone or IPad - Apple Support.” YouTube, YouTube, 5 Mar. 2018, www.youtube.com/watch?v=xTZ2LALWZlg.
  2. "Use Touch ID on Mac" Apple Support. Web. 17 Apr. 2021. https://support.apple.com/guide/mac-help/touch-id-mchl16fbf90a/mac
  3. “Why Twins Don’t Have Identical Fingerprints.” Parenthood, Healthline, 4 Jan. 2019, www.healthline.com/health/do-identical-twins-have-the-same-fingerprints.
  4. Watson, Stephanie (2021). "How Fingerprinting Works" howstuffworks.
  5. The Scientific Research Honor Society (2021). "Crime Scene Chemistry: Fingerprint Analysis" American Scientist.
  6. Apple Inc. (October, 2014). "IOS Security" IOS Security.
  7. Dormehl, Luke. (July 28, 2020). "Today in Apple history: Apple acquires the company behind Touch ID" Cult of Mac.
  8. "Locate a Device in Find My on IPhone." Apple Support. Web. 08 Apr. 2021. https://support.apple.com/guide/iphone/locate-a-device-iph09b087eda/ios
  9. Apple Inc. (2021). "About Touch ID advanced security technology" Apple Inc.
  10. Srinivasan, Avinash, and Wu, Jie. (2012). "SafeCode–safeguarding security and privacy of user data on stolen iOS devices" International Symposium on Cyberspace Safety and Security.
  11. Cherapau, Ivan, and Muslukhov, Ildar, and Asanka, Nalin, and Beznosov, Konstantin. (2015)."On the Impact of Touch ID on iPhone Passcodes" Symposium on Usable Privacy and Security.
  12. De Luca, Alexander, and Hang, Alina, and Von Zezschwitz, Emanuel, and Hussmann, Heinrich. (2015). "I Feel Like I'm Taking Selfies All Day!" Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems.
  13. Bud, Andrew. (2018). "Facing the Future: The Impact of Apple FaceID" Biometric Technology Today.
  14. 14.0 14.1 14.2 Ahmad, Diana Al, and Al, Hadeel, and Hamad, Nada. (2015). "Effectiveness of Iphone’s Touch ID: KSA Case Study" International Journal of Advanced Computer Science and Applications.
  15. Apple Use Touch ID on iPhone and iPad
  16. “Biometric - Keyless Door Locks - Door Locks.” The Home Depot, www.homedepot.com/b/Hardware-Door-Hardware-Door-Locks-Keyless-Door-Locks/Biometric/N-5yc1vZc2bdZ1z1pm1g.
  17. “10 Best Biometric Gun Safes In 2021.” Gun Reviews and Buying Guides, 28 Jan. 2021, robarguns.com/biometric-gun-safe.
  18. World Leaders in Research-Based User Experience. “Case Study of Facial-Recognition Payment in China.” Nielsen Norman Group, 10 May 2020, www.nngroup.com/articles/face-recognition-pay/.
  19. Apple "About Face ID Advanced Technology"
  20. William Judd "The iPhone home button won’t work with gloves"
  21. "Apple Face ID to work for mask wearers BBC News
  22. National Research Council. (2010). [www.nap.edu/read/12720/chapter/6#111 “Read ‘Biometric Recognition: Challenges and Opportunities’ at NAP.edu.”] National Academies Press: OpenBook.
  23. U.S. Senator Ron Wyden of Oregon. [www.wyden.senate.gov/priorities/gps-act “GPS Act”] Ron Wyden United States Senator for Oregon.
  24. Cooper, Isaac. (September 2019). [www.researchgate.net/publication/335768067_Ethical_Issues_in_Biometrics “(PDF) Ethical Issues in Biometrics”] ResearchGate.
  25. Simic, Bojan. (25 Sept. 2017). [www.forbes.com/sites/forbestechcouncil/2016/12/22/the-promise-and-challenges-of-biometrics/?sh=73359d7c7e6b “Council Post: The Promise And Challenges Of Biometrics”] Forbes Magazine.
  26. Goel, Vindu (April 10, 2017). "That Fingerprint Sensor on Your Phone Is Not as Safe as You Think" The New York Times.
  27. Thompson, Terrill. (2018). [www.washington.edu/accesscomputing/resources/accesscomputing-news-february-2018/iphone-x-and-accessibility “iPhone X and Accessibility | AccessComputing”] AccessComputing.
  28. Aquino, Steven. (21 Nov. 2017). [www.stevensblog.co/blogs/what-face-id-means-for-accessibility “What Face ID Means for Accessibility”] Steven’s Blog.
  29. RightPoint. (6 Dec. 2017). [www.rightpoint.com/thought/articles/2017/12/06/what-does-x-face-mean “The iPhone X: What Does Face ID Mean for Accessibility?”] Rightpoint.
  30. Ingber, Janet. (Feb. 2018). [www.afb.org/aw/19/2/15124 “The iPhone X for People with Visual Impairments: Face ID, New Gestures, and Useful Commands | AccessWorld | American Foundation for the Blind”] American Foundation for the Blind.
  31. Harmon, Katherine. “Can You Lose Your Fingerprints?” Scientific American, Scientific American, 29 May 2009, www.scientificamerican.com/article/lose-your-fingerprints/.