Next Three Myths about QR Code Security [Part 2]

QR Codes while popular, come with its own set of myths. Here are new myths on QRCode vs NFC, analytics and piracy

Next 3 Myths about QR Code Security.

In our earlier post, we covered the top 4 myths associated with QR Code Security. In this post we will add three more. Here are the next three.

Myth # 5: QR Codes Are Less Useful Than NFC

NFC (Near-Field Communications, a short-range wireless technology) is way ‘cooler’ than those ugly looking QR codes. Just as it is safe to say that riding a horse everywhere is more refreshing than driving a boring car. On a practical front, while NFC does appear to be the better solution, it is far more complex to embed into devices and keep them updated The sheer magnitude of the use of QR codes, and NFC cannot match its reach – NFC is both expensive and non-scalable the way QR codes could do. By using QR Codes, which can be leveraged on any device with a camera, instead of NFC, which could have only been used on the newest generation of devices, one can address the 10x audience.

Myth # 6: QR Codes Have No Useful Analytics

Out of the box, QR codes have no analytic system. But today there is enough work done to getting scan-related statistics like several scans with times and dates. One can also get granular data including the location of the scan and device type and the operating system. Using such information helps marketers and product designers to tailor custom experiences into QR codes for different sorts of users. A simple example would be how by using a single QR code for the iOS and Android versions of an application by detecting the device type and redirecting to either Google Play or the App Store.

Myth #7: QR codes can be “hijacked” or redirected to a pirate site

In case of a QR Code, the encoded information in a QR Code can’t be altered easily or redirected to a different URL, without regenerating a new QR Code. Even if websites can be ‘hijacked,’ QR Code information remains secure because it is a static, printed image since QR Code structural technology makes it difficult for a highly modified or customized QR Code to accidentally direct the user to an unintended destination. With proprietary scanners by vendors, tampered QR Codes are also unlikely to scan.

However it is also true that most readers simply go to the URL directly without really having the ability to check the authenticity of the source/ generator of QR code. It is hence, more prone to “phishing” attacked i.e going to a pirate site and getting ur personal information or may go to a malicious site.

While QR codes will continue to be treated like most other technology pieces – with skepticism. Remember the early days of Telephone, Computer or SMS or even a mobile phone. Who would use this ten year from now was the question and in all cases they have become mainstream and have been innovated into something bigger? Just because a few people are not raving about technology doesn’t mean that they’re not using it.

Additional Links -

10 amazing uses of QR Codes in industry that you may never have guessed

How can Secure QR Code Technology can be deployed for documents

Why wait? It is easy to integrate Qryptal
Take the first step today!

Leading organisations and brands rely on Qryptal

We have cusomers and users in most parts of the world.