Questions tagged [device-locking]
The device-locking tag has no summary.
26 questions
18
votes
3
answers
13k
views
Can fingerprint readers be trusted?
I've recently obtained a new notebook, specifically a Thinkpad. Now I found out that it has a fingerprint reader integrated into the power button. I am skeptical about biometrics as a security ...
1
vote
0
answers
140
views
Can forcing people to not lock their Windows be taken as a security problem? [closed]
Today I have finally resolved one of the most irritating (at least for me) features of Windows 11. That is fact that my computer goes to sleep 60 seconds or so after I lock it even though I have set ...
1
vote
0
answers
528
views
How does Android 12 / Pixel 6 allow data access before encryption key entry?
Following on from Why do mobile devices force user to type password after reboot?, I've noticed that my Pixel 6 Pro can access data after a restart. e.g. WhatsApp messages come through and ...
4
votes
3
answers
1k
views
Friendly reminders for people who don't lock laptops
My bosses have tasked me with coming up with a kind of "friendly reminder" card that we can leave on the desks of folks where we see they've walked away without locking their workstation and we have ...
42
votes
9
answers
12k
views
What are the potential risks of leaving a device in public, but locked? [closed]
Let's say you're in a public café, or conference, where you trust your device won't be stolen if you go to the bathroom for 5 minutes, but you don't trust it might not be tampered with.
What are the ...
1
vote
2
answers
608
views
How to ensure web-camera is accessed legitimately?
I've recently became baffled as to how often is there an attempt to use a web-camera on my laptop. And I mean - out of the blue, when I had neither an intent nor a context to use it.
How do I know ...
2
votes
1
answer
16k
views
What happens if incorrect SIM card PUK entered 10 times?
I know that if incorrect SIM card PIN is entered three times, it is erased, so there is no longer any valid PIN, but user can set up new PIN with PUK.
But when incorrect PUK is entered 10 times, it is ...
1
vote
3
answers
1k
views
Is it ill-advised to use the same password for lock screen and full disk encryption (Windows 10 BitLocker)?
I am wondering which attacks can be prevented by using a different password for the lock screen and full disk encryption. The goal is to prevent people from accessing my data. The details of my setup ...
50
votes
5
answers
11k
views
Downsides of showing email address on Android lock screen
My stock Android 9.0 gives me the option of showing some short text message on the lock screen. I want to add my email address here, so people know how to contact me if they find my phone.
Are there ...
1
vote
0
answers
666
views
How do third party providers remove the SIM lock on a mobile phone?
There are third party providers online who offer to remove the SIM lock on mobile phones, by emailing the unlock code. All they ask for is the phone's IMEI and the network provider's name.
In one ...
1
vote
1
answer
265
views
Is there any system that can authenticate my device to open only select apps on it?
I am looking to have an authentication system with which I can link a device to an employee, and then put in place certain privileges so that the employee is only able to open select apps on only that ...
1
vote
2
answers
3k
views
How can an Android device be unlocked, and how long would that take?
The original question was about the minimum password (or PIN) length (or entropy) for the screen lock in Android. Seeing that nobody answered, and following Schroeder's advice, I'm going to edit it ...
2
votes
1
answer
545
views
Shoulder surfing prevention or mitigation for unlocking mobile devices
How can shoulder surfing be prevented or mitigated when unlocking mobile devices?
I found other questions about shoulder surfing that focus more on desktop machines, but I believe the issue is much ...
5
votes
1
answer
326
views
Do app lockers improve smartphone security?
I recently installed Norton App Lock on my smartphone. It asks for a password pattern every time one tries to open an app. So, theoretically, it protects you in case someone is able to bypass your OS ...
0
votes
1
answer
284
views
Device Identification for 2FA challenge
Most sites that take security seriously, try to identify the moment when you use a new (or "unfamiliar") device to sign in to your online account. Example, when you sign in from a different computer ...