{"id":239164,"date":"2023-02-07T20:05:44","date_gmt":"2023-02-07T18:05:44","guid":{"rendered":"https:\/\/shop.thekernel.ua\/skaner-vidbitkiv-na-smartfoni-naskilki-ce-nadijno"},"modified":"2023-02-28T11:54:31","modified_gmt":"2023-02-28T09:54:31","slug":"fingerprint-scanner-on-a-smartphone-how-reliable-it-is","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/fingerprint-scanner-on-a-smartphone-how-reliable-it-is","title":{"rendered":"Fingerprint scanner on a smartphone \u2013 how reliable it is"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.0&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/02\/\u0415\u043c\u043a\u043e\u0441\u043d\u0456-\u0441\u043a\u0430\u043d\u0435\u0440\u0438.jpg&#8221; background_size=&#8221;contain&#8221; min_height=&#8221;712px&#8221; custom_margin=&#8221;-50px||||false|false&#8221; custom_padding=&#8221;||||false|false&#8221; filter_brightness=&#8221;130%&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;7%||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;DM Sans|500|||||||&#8221; header_font=&#8221;|300|||||||&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;5em&#8221; header_letter_spacing=&#8221;3px&#8221; header_line_height=&#8221;1.1em&#8221; header_2_font=&#8221;|300|||||||&#8221; header_2_text_color=&#8221;#FFFFFF&#8221; header_2_font_size=&#8221;3em&#8221; header_2_letter_spacing=&#8221;10px&#8221; header_2_line_height=&#8221;2.7em&#8221; header_text_shadow_style=&#8221;preset1&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span style=\"color: #ffffff;\"><b>Fingerprint scanner <\/b><\/span><\/h1>\n<h1><span style=\"color: #ffffff;\"><b>on a smartphone \u2014 <\/b><\/span><\/h1>\n<h2><span style=\"color: #ffffff;\"><b>how reliable it is<\/b><\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|5.1%||3%|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.19.3&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>Fingerprint scanner on a smartphone \u2013 how reliable it is<\/b><\/h1>\n<p><span style=\"font-weight: 400;\">Even 20 years ago, few people wondered why a fingerprint scanner was needed, and today it is present on many smartphones released after 2014. Agree, it is convenient to unlock the device, confirm purchases in online stores or open accounts in online services with one touch.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But are fingerprint scanners on smartphones reliable from the point of view of information security? Let&#8217;s figure it out.<\/span><\/p>\n<h2><b>How hackers hacked the iPhone 5S \u2014 a breakthrough in the field of biometrics<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">On September 20, 2013, sales of the iPhone 5S \u2014 the seventh-generation iPhone device with a Touch ID biometric scanner, which became a real breakthrough in biometric authentication \u2014 began. <\/span><i><span style=\"font-weight: 400;\">It is noteworthy that a year earlier, Apple Corporation purchased Authentec, a company specializing in computer security, identity management and the production of biometric scanners, for $356 million.<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the time, it was the first smartphone to have a biometric scanner. It was assumed that its presence would reliably protect the information on the device from hacking.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, within a few days, a group of German hackers published step-by-step instructions for breaking Touch ID. The essence of their method was to attach to the scanner a facsimile taken from a photograph of the owner&#8217;s fingerprint. <\/span><i><span style=\"font-weight: 400;\">The print itself can technically be removed from a window or glass and slightly corrected in Photoshop<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, the print was photographed in high resolution (2400 dpi) and printed on thick paper, cardboard (1200 dpi), then filled with latex (or ordinary carpenter&#8217;s glue) and waited for drying. The separated form, put on the finger of the attacker, was perceived by the sensor as the finger of the real owner. It turned out that the scanner can be fooled using a dummy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This did not prevent the company from continuing to release models with a biometric scanner and had little effect on further sales of the iPhone 6, iPhone 6 Plus, iPhone 6s, iPhone 6s Plus and other company devices. At most, the trend has been picked up further by all smartphone manufacturers, continuing to discover and improve new technologies to overcome the shortcomings of previous versions.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/12\/\u0425\u0430\u043a\u0435\u0440\u0438-\u0437\u043b\u0430\u043c\u0430\u043b\u0438-iPhone-5S.png&#8221; alt=&#8221;Hackers hacked iphone 5s&#8221; title_text=&#8221;Hackers hacked iphone 5s&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>User concerns about biometric security<\/b><\/h3>\n<h4><b>Sending a printout to the server<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Almost immediately after the sale of the first devices and the scandalous story with the Touch ID hack, Apple was accused of sending fingerprint scans to servers where they could be stolen by fraudsters. However, the company was able to refute this accusation, since a pair of keys is created with cryptographic encryption in mind when the fingerprint is saved. Next, a special chip inside the device is used to store and match the print. And only the corresponding encrypted cryptographic key is transmitted to the server, which cannot be used to reproduce the image itself.<\/span><\/p>\n<blockquote>\n<p><b><i>Note.<\/i><\/b><i><span style=\"font-weight: 400;\"> Digital forensics experts can still either get a fingerprint from the smartphone&#8217;s memory using specialized software, or bypass the phone&#8217;s protection despite the user&#8217;s fingerprint lock<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<\/blockquote>\n<h4><b>Severed finger to break<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Almost immediately after the presentation of the iPhone 5S, many potential buyers began to express fears that thieves will begin to cut off the owners&#8217; fingers in order to unlock their devices. However, Sebastian Tavo, director of technology at Validity Sensors, assured that the RF capacitive sensor technology takes into account a number of indicators (humidity, temperature, etc.). Therefore, a severed finger will not work as a key. <\/span><\/p>\n<h2><b>Types of biometric scanners and their reliability<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The surface of the finger pad not only has a unique papillary pattern woven from the configuration of ridges, depressions, pores on the surface of the skin, but also has thermal and electrical characteristics. This means that light, heat, electricity, and ultrasound can be used to obtain a fingerprint. Today, fingerprint scanners used on personal devices can be divided into three main groups:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">optical \u2014 receive a print with the help of light;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">semi-conductors \u2013 receive a print using electricity or heat;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ultrasonic \u2014 receive a three-dimensional impression with the help of sound.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Let&#8217;s consider their advantages and disadvantages.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/12\/\u041e\u043f\u0442\u0438\u0447\u043d\u0456-\u0441\u043a\u0430\u043d\u0435\u0440\u0438-\u0432\u0456\u0434\u0431\u0438\u0442\u043a\u0456\u0432.jpeg&#8221; alt=&#8221;Optical fingerprint scanners&#8221; title_text=&#8221;Optical fingerprint scanners&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #808080;\"><em>Optical scanners<\/em><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>Optical scanners<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">An optical scanner is usually installed on OLED displays. It works like a camera: when applying a finger, the area of the scanner is illuminated and the reflection of light from the finger falls on the photosensitive matrix, where it is further transformed into a digital image.<\/span><\/p>\n<p><strong>Advantages of optical scanners:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They can be installed directly under the touch screens of user devices, which is very convenient to use.<\/span><\/li>\n<\/ul>\n<p><strong>Disadvantages:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the speed of the scanner directly depends on the resolution of the matrix;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">work with two-dimensional images, and light is reflected equally both from the skin and from another surface, so optical devices are easier to deceive;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the stability of their work depends very much on the cleanliness and moisture of the finger;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">sometimes the reader does not work well with a protective glass or protective film on the screen.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/12\/\u0415\u043c\u043a\u043e\u0441\u043d\u0456-\u0441\u043a\u0430\u043d\u0435\u0440\u0438.jpg&#8221; alt=&#8221;olympus digital camera&#8221; title_text=&#8221;olympus digital camera&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #808080;\"><em>Capacitive scanners<\/em><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>Semiconductor scanners<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">There are several types of semiconductor scanners (thermal, radio frequency, capacitive, pressure sensors). But most of them (except capacitive) are usually not used in smartphones due to serious disadvantages \u2013 high price, bulkiness, unstable work with the image, tendency to wear out quickly (in particular, sensors pressure). Therefore, we will consider the most common of them \u2013 capacitive scanners.<\/span><\/p>\n<p><b>Capacitive scanners<\/b><span style=\"font-weight: 400;\"> made on the basis of a silicon plate containing microcapacitors located in a matrix. The scanning itself is based on changing the charge of the capacitors when touching the surface of the finger. And since the width of the papillary ridge is about 450 \u03bcm, and the capacitor modules have a size of 50 \u00d7 50 \u03bcm, such scanners read the print quite accurately, capturing minimal differences in the papillary pattern.<\/span><\/p>\n<p><strong>Advantages of capacitive scanners:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">low cost;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the highest speed of information processing compared to other types of scanners;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">accuracy and reliability of work;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">works effectively even if the surface of the finger is dirty or dry.<\/span><\/li>\n<\/ul>\n<p><strong>Disadvantages:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">it is impossible to install a capacitive scanner under the screens of personal devices;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">in order to make the device cheaper, manufacturers use more budget versions of scanners, and their resolution is low, so they can be tricked with dummies;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">for the scanner to work without failures, to be more durable, to be more protected against dummies (work with a higher resolution), it is better to use capacitive scanners on separate, remote devices.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/12\/\u0423\u043b\u044c\u0442\u0440\u0430\u0437\u0432\u0443\u043a\u043e\u0432\u0456-\u0441\u043a\u0430\u043d\u0435\u0440\u0438.jpg&#8221; alt=&#8221;Ultrasonic scanners&#8221; title_text=&#8221;Ultrasonic scanners&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #808080;\"><em>Ultrasonic scanners<\/em><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><b>Ultrasonic scanners<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Such devices work according to the principle of an ultrasound scanner. The device sends imperceptible ultrasonic signals to the surface of the finger. They push away from him and return to the scanner, which recognizes the image in a three-dimensional projection.<\/span><\/p>\n<p><strong>Advantages of such a device:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">high accuracy and reliability of reading even with contamination;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">no need to touch the device;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the device can be installed not only under glass, but also anywhere on the device, since signals pass through many surfaces;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">it is impossible to fool such a scanner with a dummy.<\/span><\/li>\n<\/ul>\n<p><strong>Disadvantages:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the development of technologies is still in the process of improvement and has not been widely implemented;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">high price for such devices.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Despite the shortcomings of the devices, they can be called reliable due to the impossibility of forging a fingerprint.<\/span><\/p>\n<h2><b>Which scanners are the most reliable?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">We have listed in our article the most popular fingerprint scanners today, all of them have advantages and disadvantages. But in order not to choose between high price and quality, we offer an alternative option \u2013 YubiKey capacitive security keys of the Bio series with a fingerprint sensor.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/12\/\u0415\u043c\u043a\u043e\u0441\u043d\u0456-\u0441\u043a\u0430\u043d\u0435\u0440\u0438-YubiKey.jpg&#8221; alt=&#8221;Capacitive scanners yubikey&#8221; title_text=&#8221;Capacitive scanners yubikey&#8221; url=&#8221;https:\/\/shop.thekernel.ua\/en\/shop\/yubikey-bio-fido-edition&#8221; url_new_window=&#8221;on&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/shop.thekernel.ua\/en\/shop\/yubikey-bio-fido-edition\"><span style=\"color: #808080;\"><em>YubiKey Bio<\/em><\/span><\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><strong>Their advantages:<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">high-quality devices are practically not subject to wear and tear thanks to a reliable reinforced case without insertable or removable parts;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">they have a level of protection against dust and moisture IP68 \u2014 that is, they can be underwater at a depth of up to 1 meter or fall into sand and then continue to work as if nothing had happened;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the fingerprint is stored on the chip and is not transmitted to the server; at the same time, unlike smartphones, the device is completely protected from reading and copying, therefore, the information on them cannot be read by any specialized means (there are simply no hidden or open folders for reading as on personal devices);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the YubiKey Bio security key works with thousands of sites where you can potentially replace password login with fingerprint login or use the key for two-factor authentication; for this, the device supports all necessary protocols: FIDO2, FIDO U2F;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">YubiKey keys of the Bio series have two types of form factors: USB-A, USB-C, so they can be used not only for smartphones, but also for other personal devices.<\/span><\/li>\n<\/ul>\n<p><b>Find more information or order the device described above <\/b><a href=\"https:\/\/shop.thekernel.ua\/en\/shop\/yubikey-bio-fido-edition\"><b>you can here<\/b><\/a><b>. If you need a consultation, call: +38 (044) 35 31 999<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;current&#8221; orderby=&#8221;rand&#8221; _builder_version=&#8221;4.19.3&#8243; _module_preset=&#8221;default&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/04\/090f3141-scaled.jpg&#8221; custom_margin=&#8221;||-85px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fingerprint scanner on a smartphone \u2014 how reliable it isFingerprint scanner on a smartphone \u2013 how reliable it is Even 20 years ago, few people wondered why a fingerprint scanner was needed, and today it is present on many smartphones released after 2014. Agree, it is convenient to unlock the device, confirm purchases in online [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":239217,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Whether a reliable fingerprint scanner on your smartphone, and how different is from hardware keys.","_seopress_titles_desc":"Let&#039;s look at the types of fingerprint scanners when they work and how to choose between the budget and a reliable option, as well as whether the hardware key scanners work more reliably.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403],"tags":[],"class_list":["post-239164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/239164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=239164"}],"version-history":[{"count":9,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/239164\/revisions"}],"predecessor-version":[{"id":239566,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/239164\/revisions\/239566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/239217"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=239164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=239164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=239164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}