Biometric Authentication
Biometric authentication uses your unique physical characteristics to secure your Balance account. This guide explains how it works and why it’s secure.
What is Biometric Authentication?
Biometric authentication verifies your identity using:
- Face ID - Facial recognition (iOS)
- Touch ID - Fingerprint scanning (iOS)
- Fingerprint - Fingerprint sensor (Android)
- Face Unlock - Facial recognition (Android)
Instead of typing a password, you use something unique to you—your face or fingerprint—that can’t be easily stolen or guessed.
Why Biometric Authentication is Secure
Unique to You
- Your biometric data is unique - No two people have the same fingerprint or face
- Can’t be guessed - Unlike passwords, can’t be brute-forced
- Can’t be stolen online - Biometric data isn’t transmitted over internet
- Hard to forge - Modern systems detect fake attempts
Protected by Hardware
- Secure Enclave (iOS) - Dedicated security chip stores biometric data
- TEE (Android) - Trusted Execution Environment isolates biometric data
- Never leaves device - Biometric data stays on your phone
- Encrypted storage - Even on device, it’s encrypted
- OS-protected - Only operating system can access
Additional Security Layers
- Liveness detection - Ensures you’re present (not a photo)
- Attention detection - Face ID requires you to be looking
- Failed attempt limits - Multiple failures require password
- Time delays - Increasing delays after failed attempts
How Balance Uses Biometric Authentication
What Gets Stored
When you enable biometric login in Balance:
- Your credentials encrypted - Username/token encrypted
- Stored in device keychain - iOS/Android secure storage
- Protected by biometric - Only unlocked with your biometric
- Device-specific - Each device stores its own
Balance never receives:
- ❌ Your fingerprint image
- ❌ Your face scan
- ❌ Biometric templates
- ❌ Any biometric data
Balance only knows:
- ✅ You enabled biometric login
- ✅ Authentication succeeded or failed
The Authentication Flow
- You open Balance app
- Biometric prompt appears - “Log in with Face ID”
- You authenticate - Look at device or scan finger
- Device verifies - Checks against stored biometric
- Keychain unlocked - Your encrypted credentials retrieved
- Balance logs you in - Using the decrypted credentials
- You’re in! - Access to your account
All biometric verification happens on your device - Balance just receives “authenticated” or “failed.”
Security Advantages
Over Passwords
Passwords can be:
- 👁️ Seen over your shoulder
- 💾 Saved insecurely
- 🤔 Forgotten
- 📝 Written down
- 🔓 Reused across sites
- 🎣 Phished
- 💻 Keylogged
Biometrics:
- ✅ Can’t be seen or stolen
- ✅ Can’t be forgotten
- ✅ Don’t need to be written down
- ✅ Unique to each person
- ✅ Can’t be phished
- ✅ Can’t be keylogged
Over PINs
PINs can be:
- 👀 Observed
- 🤖 Brute-forced (4-6 digits)
- 🧠 Forgotten
- 📱 Left visible on device
Biometrics:
- ✅ Can’t be observed
- ✅ Billions of possible combinations
- ✅ Can’t be forgotten
- ✅ Part of you
Platform-Specific Security
iOS - Face ID
How Face ID works:
- TrueDepth camera - Projects 30,000 infrared dots
- 3D face map created - Depth map of your face
- Neural networks - Process and match the data
- Secure Enclave - Match happens in secure chip
- Result only - Only “match” or “no match” leaves Secure Enclave
Security features:
- Attention detection - Must be looking at device
- Adaptive learning - Learns gradual face changes (beard, glasses)
- Anti-spoofing - Cannot be fooled by photos or masks
- 3D depth required - 2D images don’t work
- Infrared-based - Works in dark
Security stats:
- 1 in 1,000,000 chance - Random person could unlock (vs 1 in 50,000 for Touch ID)
- Twins/siblings - May have reduced security
- Updates improve - Machine learning gets better over time
iOS - Touch ID
How Touch ID works:
- Capacitive sensor - Reads fingerprint ridges
- High-resolution image - 500 pixels per inch
- Multiple angles - Each unlock adds to template
- Secure Enclave storage - Fingerprint never leaves
- Comparison - Match happens in secure chip
Security features:
- Subsurface scanning - Reads beneath skin surface
- Living tissue detection - Won’t work with fake fingers
- Multiple fingerprints - Can enroll up to 5
- Regular re-check - Periodically requires password
Security stats:
- 1 in 50,000 chance - Random person could unlock
- 48 hours - Requires password after 48 hours of no use
- After restart - Password required after device restart
Android - Fingerprint
How fingerprint works (varies by device):
- Sensor technology - Optical, capacitive, or ultrasonic
- Fingerprint capture - Multiple scans during enrollment
- Template created - Mathematical representation stored
- TEE storage - Stored in Trusted Execution Environment
- Comparison - Matching done in secure hardware
Security features:
- Liveness detection - Most modern sensors detect living tissue
- Multiple enrollments - Usually 4-5 fingerprints
- Fallback to password - Required after failed attempts
- Secure hardware - Biometric data isolated from OS
Security varies by:
- Device manufacturer
- Sensor technology
- Android version
- Hardware security features
Android - Face Unlock
How face unlock works (varies widely):
High-end devices:
- Similar to Face ID
- 3D facial mapping
- Infrared sensors
- Secure processing
Standard devices:
- 2D camera image
- Software matching
- Less secure than Face ID
Security consideration:
- Not all Android face unlock is equal
- Some can be fooled by photos
- Check device security rating
- Fingerprint often more secure on Android
Biometric Security Best Practices
Do’s
For Maximum Security:
- ✅ Enable biometric login - More secure than passwords alone
- ✅ Use strong password backup - Still needed occasionally
- ✅ Keep device updated - Security improvements in updates
- ✅ Enable device lock - Screen lock prevents physical access
- ✅ Clear biometrics if device shared - Remove others’ biometrics
- ✅ Re-enroll periodically - For better accuracy (fingerprint)
Don’ts
Avoid These Mistakes:
- ❌ Don’t share devices - Others might add their biometrics
- ❌ Don’t enroll others - Never add someone else’s biometric
- ❌ Don’t disable device security - Always have screen lock
- ❌ Don’t ignore biometric failures - Multiple failures could indicate attack
- ❌ Don’t use on highly shared devices - Better for personal devices
Limitations & Considerations
When Biometrics Don’t Work
Password required after:
- Device restart or power on
- 48+ hours without unlocking
- 5 failed biometric attempts
- Remote lock command
- Enrolling new biometric
- Sometimes after app updates
Physical limitations:
- Wet fingers - Touch ID may not work
- Gloves - Fingerprint won’t work with gloves
- Face coverings - Face ID requires visible face (with mask)
- Sunglasses - Very dark sunglasses may block Face ID
- Extreme lighting - Very bright or dark conditions
Privacy Concerns
Law enforcement access:
- Some jurisdictions allow forced biometric unlock
- Cannot be forced to reveal password (5th Amendment in US)
- Consider disabling biometric in sensitive situations
Shared device scenarios:
- Family member might unlock while you sleep
- Consider password-only in these situations
Medical situations:
- Biometric might be accessible if incapacitated
- Consider emergency contacts who should have access
Combining Security Methods
Layered Security
Best practice: Use multiple security layers
- Biometric login - Convenient daily access
- Strong password - Backup method
- Device lock - Physical security
- 2FA (when available) - Additional verification
Example scenario:
- Biometric for quick daily access
- Password for sensitive changes
- Device lock prevents access if phone lost
- 2FA prevents remote compromise
Two-Factor Authentication (Coming Soon)
Balance is working on 2FA:
- Code sent to phone/email
- Required for sensitive actions
- Even if biometric compromised
- Additional security layer
Biometric vs Password Security
Scenario Comparison
| Scenario | Biometric | Password |
|---|---|---|
| Device stolen (locked) | ✅ Secure | ✅ Secure |
| Device stolen (unlocked) | ❌ Vulnerable | ❌ Vulnerable |
| Over-shoulder observation | ✅ Can’t see | ❌ Can see |
| Forced unlock | ❌ Can be forced | ✅ Can’t be forced (legally) |
| Forgotten credentials | ✅ Can’t forget | ❌ Can forget |
| Remote attack | ✅ Can’t attack | ❌ Phishing possible |
| Keylogger | ✅ Not affected | ❌ Could capture |
Bottom line: Each has strengths. Using both provides best security.
Disabling Biometric Login
When to Disable
Consider temporarily disabling biometric:
- Traveling internationally - Border security concerns
- Sensitive meetings - Extra privacy needed
- Lending device - Temporarily sharing device
- Lost/stolen - If you can remotely access device
- Upgrading phones - Before transferring device
How to Quickly Disable
iOS:
- Press side button + volume button
- “Slide to Power Off” appears
- Press Cancel
- Face ID/Touch ID now disabled (password required)
Android:
- Press and hold power button
- “Lockdown mode” option
- Disables biometric until next password entry
In Balance:
- Settings menu
- Toggle biometric login off
- Stored credentials cleared
Future Enhancements
Balance may add:
- Biometric for sensitive actions - Require Face ID to delete accounts
- Biometric settings - More granular control
- Fraud detection - Alert on unusual biometric patterns
- Voice authentication - Additional biometric option
Common Questions
Q: Is biometric authentication safer than a password?
A: Generally yes, especially against remote attacks. However, it has different weaknesses (can be forced in person). Best security uses both.
Q: Where is my fingerprint/face data stored?
A: Only on your device, in a secure hardware chip. It never leaves your phone and Balance never sees it.
Q: Can Balance access my biometric data?
A: No. Balance only receives “authenticated” or “not authenticated” from your device’s operating system. The biometric verification happens entirely on your device.
Q: What if someone uses my finger while I’m asleep?
A: This is possible but unlikely. Consider using only Face ID (requires attention) or disabling biometric in these scenarios.
Q: Can twins unlock each other’s Face ID?
A: Possibly. Face ID security is reduced for identical twins. Consider using a password in these cases.
Q: What happens if I change my fingerprints (injury)?
A: Re-enroll your fingerprint in device settings. You can also enroll multiple fingers as backup.
Q: Does biometric authentication work offline?
A: Yes! The verification happens entirely on your device without internet.
Q: Will my face/fingerprint change affect authentication?
A: Minor changes (glasses, beard, aging) are learned over time. Major changes may require re-enrollment.
Technical Details
For the technically curious:
Secure Enclave (iOS)
- Separate processor - Isolated from main CPU
- Encrypted memory - Biometric data encrypted
- Boot chain - Verified secure boot
- No direct access - Even Apple can’t access
- Key generation - Creates unique encryption keys
Trusted Execution Environment (Android)
- Isolated area - Separate from main OS
- Secure boot - Verified boot process
- ARM TrustZone - Hardware-based security
- Keymaster - Manages cryptographic keys
- Manufacturer specific - Implementation varies
Biometric Storage
What’s stored:
- Mathematical template (not image)
- Unique to device
- Cannot be reverse-engineered to image
- Encrypted with device-specific keys
What’s NOT stored:
- Actual fingerprint image
- Face photograph
- Raw biometric data
- Anything that could recreate your biometric
Next Steps
Learn more about Balance security:
- How Balance Keeps Your Data Safe - Overall security measures
- Biometric Login Setup - Enable biometric authentication
- Password Best Practices - Create strong passwords
- Two-Factor Authentication - Additional security layer
Questions about biometric security? Contact our team - we’re here to help!