Let’s talk about something most of us don’t think about until it’s too late: how you lock your phone. You’ve probably heard that using your fingerprint or face to unlock your device is fast and convenient—and it is. But when it comes to protecting your privacy using a password or PIN might actually be the safer bet.
Here’s the thing: the laws around phones and privacy are still catching up with the technology. The Fourth Amendment is supposed to protect you from unreasonable searches and seizures. That means the police can’t just go snooping through your stuff without a warrant. But phones are tricky. Courts have generally said that yes, your phone is protected and they usually need a warrant to search it. But what happens when they get that warrant, or think they don’t need one? This is where the Fifth Amendment comes in—the one that says you can’t be forced to testify against yourself. Courts have decided that a password or PIN falls under that protection. It’s something you know, and you can’t be forced to give it up. But biometrics? Your fingerprint or face? That’s something you are. And legally, it’s more like handing over a key than giving up a secret. In many cases, police can make you use your face or finger to unlock your phone without it being considered "testifying." So even though it’s easier to just glance at your phone to unlock it, that convenience could cost you if you ever end up in a legal situation. Whether you're a protester, journalist, or just someone who values your privacy, using a PIN or passcode adds a layer of protection that biometrics can’t. In the eyes of the law, knowing your code is very different from having a fingerprint. Until the courts set clearer rules, the safest move is to stick with a good old-fashioned password. It might take a few extra seconds to type it in, but that small hassle could be what keeps your private life out of someone else's hands.
0 Comments
Let’s be real here—passwords are the worst. You’re supposed to make them long, complicated, and unique for every website, but who actually remembers all of that? So we reuse them, or write them down, or forget them entirely. That’s where passkeys come in, and they’re kind of a game-changer.
A passkey is a new, easier, and way more secure way to sign in to apps and websites. Instead of typing out a password, your phone or computer can log you in with something you already use—like your fingerprint, face, or device PIN (this one is best!). It’s still secure, but you don’t have to remember anything. The cool part is that passkeys are way harder for hackers to steal. With passwords, someone can trick you into typing them on a fake site or grab them in a data breach. Passkeys don’t work like that. They’re tied to your device and your identity, and they never leave your phone or computer. So even if a company gets hacked, your passkey can’t be stolen. Basically, tech companies are pushing passkeys because they’re safer, simpler, and a whole lot less annoying than passwords. And don’t worry—if you’ve ever used Face ID or a fingerprint to unlock your phone, you’ve already got the hang of it. ![]() Hackers are now using AI to make cyberattacks even easier and more dangerous. In the past, cybercriminals had to do a lot of work to steal passwords or trick people into clicking harmful links. Now, they can use AI to do most of the work for them. Recently, researchers showed how AI can be tricked into helping hackers. One test got AI on to create a fake email designed to steal someone’s personal information. Another test tricked AI into building malware on the Chrome browser—a type of software that can steal login details, credit card numbers, and other sensitive data. The scary part is that AI isn’t always able to tell when it’s doing something bad. If someone frames the request in a certain way, AI might help them without realizing it. This means cybercriminals can now create scams and harmful software faster than ever before. Because of this, traditional security measures like passwords and basic two-factor authentication (2FA) aren’t enough anymore. To protect yourself, switch to passkeys, use app-based authentication instead of text message codes, and be extra careful about where you store your passwords. AI-powered threats aren’t just a possibility—they’re already happening. ![]() Spyzie, a shady stalkerware app used to secretly monitor people's phones, got hacked—big time. This breach exposed a ton of private data, putting both the spies and their targets at risk. Stalkerware apps like Spyzie claim to be for “parental control,” but let’s be real—people often use them to spy on partners, employees, or others without consent. These apps collect everything from text messages and call logs to GPS locations and social media activity, all while staying hidden. But in a major security fail, Spyzie didn’t even bother to properly secure this data, making it easy for hackers to access and leak. Reports say that the breach exposed usernames, passwords, phone details, and even surveillance logs. To make things worse, Spyzie didn’t use encryption, meaning hackers could just grab the data without much effort. This is a huge wake-up call about the dangers of spyware—not only is it creepy and invasive, but it’s also a massive security risk. Experts are urging people to stay alert for stalkerware by checking for suspicious activity on their devices, keeping software updated, and using strong passwords. Meanwhile, privacy advocates are calling for tougher laws against these sketchy surveillance tools. The bottom line? If a company’s entire business model is based on sneaky spying, chances are they don’t care much about security either. The Spyzie hack is just another reminder that privacy and cybersecurity should always come first. |
Aimee ClarkHi there! I’m the IT Librarian at the Spencer Public Library. Welcome to the Tech Corner, where I’ll be diving into all the excitement — and headaches — from the ever-changing world of tech! Archives
April 2025
Categories
All
|