QR Codes while popular, come with its own set of myths. Here are new myths on QRCode vs NFC, analytics and piracy
Next 3 Myths about QR Code Security.
In our earlier post, we covered the top 4 myths associated with QR Code Security. In this post we will add three more. Here are the next three.
Myth # 5: QR Codes Are Less Useful Than NFC
NFC (Near-Field Communications, a short-range wireless technology) is way ‘cooler’ than those ugly looking QR codes. Just as it is safe to say that riding a horse everywhere is more refreshing than driving a boring car. On a practical front, while NFC does appear to be the better solution, it is far more complex to embed into devices and keep them updated The sheer magnitude of the use of QR codes, and NFC cannot match its reach – NFC is both expensive and non-scalable the way QR codes could do. By using QR Codes, which can be leveraged on any device with a camera, instead of NFC, which could have only been used on the newest generation of devices, one can address the 10x audience.
Myth # 6: QR Codes Have No Useful Analytics
Out of the box, QR codes have no analytic system. But today there is enough work done to getting scan-related statistics like several scans with times and dates. One can also get granular data including the location of the scan and device type and the operating system. Using such information helps marketers and product designers to tailor custom experiences into QR codes for different sorts of users. A simple example would be how by using a single QR code for the iOS and Android versions of an application by detecting the device type and redirecting to either Google Play or the App Store.
Myth #7: QR codes can be “hijacked” or redirected to a pirate site
In case of a QR Code, the encoded information in a QR Code can’t be altered easily or redirected to a different URL, without regenerating a new QR Code. Even if websites can be ‘hijacked,’ QR Code information remains secure because it is a static, printed image since QR Code structural technology makes it difficult for a highly modified or customized QR Code to accidentally direct the user to an unintended destination. With proprietary scanners by vendors, tampered QR Codes are also unlikely to scan.
However it is also true that most readers simply go to the URL directly without really having the ability to check the authenticity of the source/ generator of QR code. It is hence, more prone to “phishing” attacked i.e going to a pirate site and getting ur personal information or may go to a malicious site.
While QR codes will continue to be treated like most other technology pieces – with skepticism. Remember the early days of Telephone, Computer or SMS or even a mobile phone. Who would use this ten year from now was the question and in all cases they have become mainstream and have been innovated into something bigger? Just because a few people are not raving about technology doesn’t mean that they’re not using it.
Additional Links -