Tuesday, October 27, 22:58
Home inet How predictive the lock screen models are

How predictive the lock screen models are

The predictability of people can hardly be overestimated. This predictability can be easily exploited when it comes to things like passwords, secret words, PINs, and more. Many of us use names, birthdays and others to easily guess things like passwords, not to mention the really obvious "12345", which is still amazingly popular. But what about lock screen templates, are we predictable there when we create them? As it turns out - we are.

Marte Løge, a researcher from the Norwegian company Itera, made an analysis of what standards people really create when asked to do it for three occasions: shopping app, smartphone lock screen, and online banking, respectively. The results are quite impressive.

First, there is a strong relationship between the type of application that someone wants to lock and the power of the template. People tend to use less powerful templates to lock their smartphone screen than for online banking or even for shopping apps.

Secondly, many people, about 10% of the thousands surveyed by Løge, are using letter-like motifs, which are equivalent to "12345" codes and by any means can not be considered powerful enough to protect anything .

How predictive the lock screen models are
Third, there are about 390.000 combinations that a hacker can guess, but the number of combinations can be reduced due to the human factor. Most of the combinations mentioned above contain eight or nine points, but unfortunately they are not used. Instead the real crowd is about 100.000 combinations.

Another strange fact is that women tend to use patterns weaker than men. And the age of a person also plays a role: the younger you are, the more likely you are to use a stronger pattern. Thus, knowing the gender and age of the person can actually help to predict the pattern he or she is using.

How predictive the lock screen models are
What can we learn from this research? Basically, if you use templates to block the Android screen or some sensitive applications, and you really want to protect your data, the best strategy is to act like no other. And these are our tips:

1. Never use obvious combinations such as letter-like motifs. Using this weak pattern is like not using any pattern or password.

2. Use one of the starting points that are rarely used: the best is in the middle of the right side. The bottom right corner is also good.

3. The best lengths for a pattern are 8 points or 9 points: First, it gives you a huge number of possible combinations and secondly, these lengths are less popular.

4. And of course, think about changing from code to pattern. It can be easier to remember the password, even a very large, than a fairly powerful pattern.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

00:01:47

Data breach in a law firm exposes data of Google employees

Immigration law firm Fragomen, Del Rey, Bernsen & Loewy, LLP revealed that it suffered a data breach that led to the leakage of personal data ...

How to install a .watchface file on Apple Watch

The Apple Watch lets you customize the faces of the watch to display all kinds of useful information. But did you know ...

The five biggest data breaches of the 21st century

Data is becoming more and more sought after as our daily lives become more digitized. The technology giants that monopolize data are ...

Microsoft is limiting the availability of Windows 10 20H2

Microsoft is currently restricting the availability of Windows 10 20H2 to provide all users who want to ...

How to enable the new Chrome Read more feature

The latest version of Google Chrome browser, v86, released earlier this month, contains a secret feature called Read ...

How to choose a custom color for the Start menu

Starting with the October 2020 update, Windows 10 is the default on a theme that removes bright colors from ...

NASA telescope discovers drinking water on the moon

Eleven years ago, a spacecraft changed our view of the moon forever. The data collected by ...

Microsoft: Enhances password spray attack detection capabilities

Microsoft has significantly improved the ability to detect password spray attacks in the Azure Active Directory (Azure AD) and has reached the point ...

How to prevent companies from finding our phone number

In the age of advertising, the more user information is known the more convenient it is for companies. And in particular, the ...

Violation in a psychotherapy clinic led to blackmail of patients

Two years ago, a cyber attack took place in a Finnish psychotherapy clinic, which resulted in data theft and ransom demand. Now,...