1 of 1 people found this helpful
Hey there! You can report bugs by tapping More at the bottom, then select Give Feedback.
2 of 2 people found this helpful
A word of caution:
Using fingerprint, facial, voice, or iris recognition all have one huge flaw. In order to utilize these recognition technologies, the provider and app must have something to campare to in order to verify you each time you log in. This requires an image of your face, fingerprint, or iris, and in the case of voice recognition, an audio profile to compare with.
These are all files that need to be stored at the provider level and probably on your device as well. These are files that can possible be intercepted while traveling through the network.
If your password becomes compromised, you can change it.
If your fingerprint image gets stolen - Someone else can impersonate you forever.
Now, that's interesting. I'd never given any thought at all about the mechanism behind that function. All this time, we've been chastised about weak passwords, with facial recognition and fingerprint access being hyped without any consideration of how we might simply be adding an additional vulnerability.
I think I'll do a little reading on just how these functions are implemented.