What happens if someone is able to spoof my face?

We have a layered approach that allows you to choose multiple factors to log in – factors such as your unique facial math, Trusted Devices as a 2nd factor, and a Master Password.

This way, you can prevent unauthorized access to your sensitive information in the event that one of your factors is stolen or spoofed.

Further, if someone tries to perform a Face log in from an unknown (or untrusted) device, the True Key app always requests a second factor before allowing a successful log in. This could be a Master Password, a email request for confirmation, or 2nd Device.

Follow
Was this article helpful?
0 out of 0 found this helpful

Didn't find what you were looking for?

Contact support