Debunking Myths Part 4: Why Device Biometrics Isn’t the Ultimate Security Solution
Frances Zelazny
Co-Founder & CEO, Anonybit | Strategic Advisor | Startups and Scaleups | Enterprise SaaS | Marketing, Business Development, Strategy | CHIEF | Women in Fintech Power List 100 | SIA Women in Security Forum Power 100
Biometric technology has transformed the way we authenticate identity, delivering both convenience and enhanced security. However, like any transformative technology, it has faced scrutiny and generates concern —particularly around the issue of bias, legality, privacy, covert usage and the risks associated with AI. While the concerns are valid, they are often misunderstood or even exaggerated.?
This blog is part of a five-part series dedicated to unpacking and debunking common myths surrounding biometrics, offering clarity on where the challenges lie and how the industry has been addressing them.
This is the fourth installment, focusing on device biometrics.
See the other posts in this series:
Bias
Legal Frameworks
Template Security
Universality
Myth #1: Device Biometrics Confer Identity
One of the biggest misconceptions about device-based biometrics, like FaceID or fingerprint authentication, is that they confirm the identity of the person using the device. In reality, these systems only verify that the biometric matches the template stored on the device—they don’t guarantee who is holding it. This creates vulnerabilities, especially for enterprises and institutions managing sensitive data.
Take banking as an example: account origination (where a person’s identity is initially verified) is often a separate process from subsequent digital banking logins. Once an account is created, attackers can exploit this disconnect through social engineering—convincing users or support staff to grant them access—and then log in from any device. The biometric used to unlock the device no longer matters because the attacker bypasses it entirely.
Additionally, shared devices compound the problem. In families, multiple members often share a single device like a tablet or computer, and in workplaces, shared terminals are common. When device-based biometrics are the primary method of authentication, they provide no way to distinguish legitimate users on shared systems. This can result in unauthorized access by someone who is allowed to use the device but not specific accounts or resources.
Myth #2: Biometric Data Is Safe on the Device
A common argument for device-based biometrics like FaceID or fingerprint authentication is that the biometric templates are stored locally in a “secure enclave,” supposedly protecting them from theft or tampering. While this approach avoids the risks of centralized data breaches, it doesn’t mean the data is invulnerable. In reality, there is evidence that on-device biometrics can be tampered with or compromised in several ways and the more that biometrics will be used as a method for passwordless authentication, the more likely it is that attackers will pounce. Here are a few examples of known exploits:
Myth #3: Device Biometrics Provide MFA
Another common misconception is that device-based biometrics enhance security by serving as part of a multi-factor authentication (MFA) process. However, biometrics on a device in reality represent a single factor, replacing rather than complementing other methods of authentication. True MFA requires at least two independent factors: something you know (e.g., a password), something you have (e.g., a device or token), and something you are (e.g., a biometric). When device biometrics are used for authentication, they act as a substitute for a PIN or password, not an additional layer of security. This substitution creates an illusion of enhanced security while retaining the same vulnerabilities as single-factor authentication.
The Takeaway: Convenience Over True Security
Digging into on-device biometric frameworks and use cases show that their primary purpose is convenience rather than robust security. While storing data locally avoids some risks, it does not eliminate vulnerabilities. Attackers continually innovate, and as they develop more sophisticated methods, reliance on on-device biometrics as a standalone security measure becomes increasingly risky.
To truly protect biometric data and ensure enterprise security, we must move beyond device-based solutions. Privacy-enhancing technologies that fragment and encrypt biometric data—ensuring it cannot be reconstructed or tampered with—offer a more secure path forward. Only by addressing these limitations can we shift from prioritizing convenience to delivering genuine security.
To learn more about Anonybit’s privacy-enhancing solution, click here.
Engineer, Executive, Founder, Entrepreneur
3 个月Excellent article! So where does that leave FIDO ?????
FaceTec SVP North American Operations, President Sage Capital Advisors, LLC, Subject Matter Expert in Biometrics & IAM, Author & Award Winning Securities Analyst.
3 个月Anonymous Biometrics….biometric data that is not bound to verified identity data anywhere. While it provides a “match/no match” API response to a Relying Party, it does not confirm whose biometric data was matched. Further, with the device PIN, the biometric data can be swapped with any other biometric data, including from people not authorized to control the device or the privileges the biometric API response authorizes. This means that the Relying Party would accept a fraudulent transaction request, believing the authorized person requested it.