By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Stop Using Face ID Right Now. Here’s Why
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Stop Using Face ID Right Now. Here’s Why
News

Stop Using Face ID Right Now. Here’s Why

News Room
Last updated: 2026/02/14 at 9:49 AM
News Room Published 14 February 2026
Share
Stop Using Face ID Right Now. Here’s Why
SHARE

Using a face scan to unlock your phone and log in to accounts is certainly convenient, but it’s not the best option if you’re concerned about your privacy. That’s because, thanks to a 5th Amendment loophole, law enforcement can compel you to use biometric data to unlock your phone, but they can’t force you to give them a password or passcode. We saw this last month, when a Washington Post reporter’s home was raided by the FBI. According to court records obtained by 404 Media, agents were unable to access the reporter’s iPhone because it was in Lockdown Mode, but they got a warrant from a federal judge to compel the reporter to unlock their computer via a fingerprint scan.

So are biometric scans a safe way to lock down your devices? After all, face and fingerprint scans can be used against you, while passwords and passcodes cannot. Let’s talk about why you may want to stop using biometrics to unlock your phone, sooner rather than later.


Biometrics 101: Face ID, Fingerprints, and Passkeys

Biometric data is a fancy term for the face and fingerprint scanning that your computer, phone, or tablet uses to verify your identity. The data can unlock your device or help you log in to sensitive online accounts using a passkey. I’ve written and spoken a lot about passkeys lately, as more websites are offering this option to simplify the login process. You can create a passkey on a lockable device, either with biometric data (such as a face or fingerprint scan) or a passcode, and then use it to access your online account. 

I’d love to say that, thanks to immaculate foresight as a cybersecurity industry observer, I noticed growing unease about government surveillance and had a desire to take more control over my personal data, so I stopped using biometrics to unlock my devices. That would be a lie, though. I actually stopped scanning my face during the COVID-19 lockdown period, because I found it too difficult to unlock my phone while wearing a mask and glasses. In other words, inconvenience was my reason for ditching biometric scanning in favor of passcodes. Depending on who you are and what you do, you may have more compelling reasons to stop using biometric data on your devices.


Your Risk Level Determines Your Security Needs

What do you do at work, or during your free time? I ask because not everyone needs to lock down their devices to the maximum level. After all, it’s a lot easier to get into your accounts or unlock your phone with just a glance or a swipe, rather than trying to remember a device-specific passcode. 

People with a high risk of surveillance by governments or criminal organizations—such as activists, immigrants, journalists, and politicians—should consider using a passcode or passphrase to protect their devices, since law enforcement officers are not allowed to force you to manually enter your passcode or PIN. 

I should point out, if you fit into the categories above, it’s wise to make it harder to access all the private data on your phone or computer. As I noted in an article about securing your devices before crossing the US border, Android and iOS have settings that let you delete all your phone’s data remotely or with a tap. 


What Lockdown Mode and Advanced Protection Really Do

(Credit: Apple/PCMag)

If you use Apple devices, you can also do what Washington Post reporter Hannah Natanson did, and keep your device in Lockdown Mode. That’s a setting that blocks attachments in messages, device management configuration installations, and calls or FaceTime connections. Lockdown Mode also enables a very restrictive browsing setting on the device. Lockdown Mode is the reason why FBI agents have not been able to access Natanson’s phone data. To enable this feature on your phone, visit Settings, then browse within the Privacy and Security menu in iOS. 


Newsletter Icon

Newsletter Icon

Get Our Best Stories!

Stay Safe With the Latest Security News and Updates


SecurityWatch Newsletter Image

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

Sign up for our SecurityWatch newsletter for our most important privacy and security stories delivered right to your inbox.

By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy
Policy.

Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Android devices have a lockdown setting, too, but it’s not as comprehensive as Apple’s feature. Instead, the Android lockdown feature temporarily disables biometric unlocks for your devices so that you can quickly secure your phone if you’re worried about someone holding the front-facing camera to your face to unlock it, or holding your hand over the fingerprint reader.

Google's Advanced Protection Mode in action.

(Credit: Google/PCMag)

Android also offers a setting called Advanced Protection mode, which requires you to use either hardware security keys or passkeys to protect your Google accounts. This setting blocks harmful app or file downloads and prevents unverified third-party apps from accessing your Google data without your permission. You can enable this setting on the web by logging in to your Google account and visiting the Security and Sign-in menu.


The One Lock Law Enforcement Can’t Force Open

When you’re ready to enable passcodes to lock your devices rather than biometric scans, remember to delete your existing biometric data. The good news is that your biometric data is stored locally on your device, not in the cloud, so when you delete it from your device, it’s really gone.

Recommended by Our Editors

If you use an Android device, go to the Security and Privacy section within the Settings menu, and choose Device unlock/Biometrics. Tap the delete icon to remove your biometric data. You can then set up a passcode to unlock your device by visiting the Lock Screen section of the menu.

Screen lock settings menus on an Android device.

(Credit: Google/PCMag)

If you’re using devices running iOS, visit the Settings menu, then Face ID/Touch ID & Passcode, and tap either Reset Face ID or Delete Fingerprint. While you’re there, set a passcode to use when unlocking your devices or logging in to your accounts, using a passkey or another passwordless authentication method.

Screen lock settings menus on an iOS device.

(Credit: Apple/PCMag)


Privacy Doesn’t Stop at Your Lock Screen

It’s troubling that a reporter was compelled by her country’s government to give up her right to personal privacy while protecting a source. Maybe you think you don’t have anything to hide, and maybe you’re right, but this incident is a wake-up call to everyone. It’s time to hide your private information from government officials and strangers alike. 

Whether you commit to reading privacy policies carefully before signing up for new online accounts, cleaning up your digital footprint by closing old online accounts, or using unique, strong passwords for all of your existing accounts, the power to protect your personal data online is still in your hands. 

Check out our cybersecurity checklist for a collection of periodic tasks you can complete to improve your online safety. Finally, when you’re ready to take your digital privacy even further, read our article on how to completely disappear from the internet. 

About Our Expert

Kim Key

Kim Key

Senior Writer, Security


Experience

I review privacy tools like hardware security keys, password managers, private messaging apps, and ad-blocking software. I also report on online scams and offer advice to families and individuals about staying safe on the internet. Before joining PCMag, I wrote about tech and video games for CNN, Fanbyte, Mashable, The New York Times, and TechRadar. I also worked at CNN International, where I did field producing and reporting on sports that are popular with worldwide audiences.

In addition to the categories below, I exclusively cover ad blockers, authenticator apps, hardware security keys, and private messaging apps.

Read Full Bio

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Write Pin Descriptions That Drive Etsy Traffic Write Pin Descriptions That Drive Etsy Traffic
Next Article How Dallas-Fort Worth Businesses Can Use Local Market Intelligence to Grow How Dallas-Fort Worth Businesses Can Use Local Market Intelligence to Grow
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Windows Secure Boot Certificates From 2011 Will Be Expiring Soon. What You Need to Know
Windows Secure Boot Certificates From 2011 Will Be Expiring Soon. What You Need to Know
News
TELEPASS E-PAY Limited Delivers Reliable Payment Infrastructure for Online Merchants
TELEPASS E-PAY Limited Delivers Reliable Payment Infrastructure for Online Merchants
Gadget
The 90-Day Test: Find the Platform That Actually Pays You Back
The 90-Day Test: Find the Platform That Actually Pays You Back
Computing
Take Your Music Offline. I Found 5 Easy Ways to Convert YouTube Videos to MP3s
Take Your Music Offline. I Found 5 Easy Ways to Convert YouTube Videos to MP3s
News

You Might also Like

Windows Secure Boot Certificates From 2011 Will Be Expiring Soon. What You Need to Know
News

Windows Secure Boot Certificates From 2011 Will Be Expiring Soon. What You Need to Know

5 Min Read
Take Your Music Offline. I Found 5 Easy Ways to Convert YouTube Videos to MP3s
News

Take Your Music Offline. I Found 5 Easy Ways to Convert YouTube Videos to MP3s

10 Min Read
Galaxy Tab A9+ plunges below 0, turning into the king of value
News

Galaxy Tab A9+ plunges below $140, turning into the king of value

4 Min Read
Homeland security pushes social media giants to dox anonymous accounts critical of ICE
News

Homeland security pushes social media giants to dox anonymous accounts critical of ICE

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?