After months—no, years— of security blogs telling us how dumb it is to choose easy to guess passwords such as password1234, we look for answers in ideas for strong authentication schemes. As for the Android pattern method of locking screens, one study coming from Norway suggests we’re not exactly talking magic bullets.
Android lock patterns reveal a surprising degree of predictability. According to research, the patterns to lock and unlock Androids are not that complex. An overview of the research from Security Editor of Ars Technica, Dan Goodin, made the rounds of sites this week, when he reported “Data breaches over the years have repeatedly shown some of the most common passwords are “1234567”, “password”, and “letmein.” Now, he said, a researcher’s findings indicate that many Android Lock Patterns (ALPs) suffer a similar form of weakness.
Android Lock Patterns (ALPs) were welcomed in 2008 by many as a password alternative, taken as an innovative approach to lock your phone.
Sophos’ John Zorabedian in Naked Security also noted that recently a researcher spent a year studying how people create lockscreen patterns, and she found interesting results.
Her study involved 3400 users and their selected lock patterns. Marte Løge, who is a technology analyst at Itera, presented her findings earlier this month at a conference in a talk titled “Tell me Who You Are and I Will Tell You Your Lock Pattern.“
“A lockscreen pattern allows you to lock/unlock your device by swiping your finger on the screen – you…