Thursday, April 9, 21:17
Home inet How predictive the lock screen models are

How predictive the lock screen models are

The predictability of people can hardly be overestimated. This predictability can be easily exploited when it comes to things like passwords, secret words, PINs, and more. Many of us use names, birthdays and others to easily guess things like passwords, not to mention the really obvious "12345", which is still amazingly popular. What about lock screen models, are we predictable when we create them? As it turns out - we are.

Marte Løge, a researcher from the Norwegian company Itera, made an analysis of what standards people really create when asked to do it for three occasions: shopping app, smartphone lock screen, and online banking, respectively. The results are quite impressive.

First, there is a strong relationship between the type of application that someone wants to lock and the power of the template. People tend to use less powerful templates to lock their smartphone screen than for online banking or even for shopping apps.

Secondly, many people, about 10% of the thousands surveyed by Løge, are using letter-like motifs, which are equivalent to "12345" codes and by any means can not be considered powerful enough to protect anything .

How predictive the lock screen models are
Third, there are approximately 390.000 combinations that a hacker can guess, but the number of combinations can be shrunk due to the human factor. The majority of the combinations mentioned above contain eight or nine points, but unfortunately they are not used. Instead, the actual crowd is about 100.000 combinations.

Another strange fact is that women tend to use patterns weaker than men. And the age of a person also plays a role: the younger you are, the more likely you are to use a stronger pattern. Thus, knowing the gender and age of the person can actually help to predict the pattern he or she is using.

- Advertisement -

How predictive the lock screen models are
What can we learn from this research? Basically, if you use templates to block the Android screen or some sensitive applications, and you really want to protect your data, the best strategy is to act like no other. And these are our tips:

1. Never use obvious combinations such as letter-like motifs. Using this weak pattern is like not using any pattern or password.

2. Use one of the starting points that are rarely used: the best is in the middle of the right side. The bottom right corner is also good.

3. The best lengths for a pattern are 8 points or 9 points: First, it gives you a huge number of possible combinations and secondly, these lengths are less popular.

4. And of course, think about changing from code to pattern. It can be easier to remember the password, even a very large, than a fairly powerful pattern.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

loopfs: Could it be the new Linux file system?

Linux supports several file systems, such as EXT4, F2FS, Btrfs and XFS. These systems are sufficient when ...

Research: Teenagers prefer iPhones to Samsung phones

According to research conducted every six months in order to record the habits of teenagers, young people do not choose Samsung phones ....

Bill Gates: Schools open in the fall and the economy collapses

Bill Gates believes schools will be able to open in the fall, he told Becky Quick on CNBC.

OTE Group Telecommunications Museum: Educational programs and entertainment activities from home for children aged 4-12 and the whole family

Educational programs and entertainment activities for children and families, in which they can participate from home, are offered by the Group's Telecommunications Museum ...

Microsoft: The April 2020 update for Office has been released

Microsoft released the non-security updates of April 2020 for Microsoft Office, which include corrections for errors as well as improvements ...

Tesla's new Cheetah mode offers top performance

The new Cheetah mode in the Tesla S model pushes the electric car from 0 to 100 km / h faster than ...

Tails 4.5: The new, safer version has been released!

Tails 4.5: The new, safer version has been released - Tails, is a live operating system based on ...

Windows 10 feature helps to delete useless files and apps

Windows 10 will make it easier to delete useless files and apps by displaying them in a list.

Cloudflare: Stops using Google's reCAPTCHA!

Cloudflare has announced that it will stop using Google's reCAPTCHA and switch to a new bot detector that ...

Google Stadia Pro is available for free for two months! Time for video games!

The situation we are experiencing lately due to corona, is one of the most difficult situations of ...