How biometric authentication works
When you enable biometric unlock in Spendify, you're adding a layer of security that uses your unique physical characteristics — your face or fingerprint — to verify that it's really you opening the app.
Your biometric data stays on your device
This is the most important thing to know: Spendify never receives, stores, or has access to your biometric data.
Here's why: Face ID, Touch ID, and Android fingerprint authentication are handled entirely by your device's operating system. When you scan your face or fingerprint, your device checks it against the biometric data stored in its secure hardware (Apple's Secure Enclave or Android's Trusted Execution Environment). The device simply tells Spendify "yes, this is the right person" or "no, it isn't." Your actual biometric data never leaves the secure chip on your device.
Supported biometric methods
Face ID — Uses the TrueDepth camera on newer iPhones to create a detailed 3D map of your face.
Touch ID — Uses the fingerprint sensor on older iPhones to read your fingerprint.
Android fingerprint — Uses your Android device's fingerprint sensor for authentication.
What happens if biometric authentication fails?
Sometimes biometric scans don't work perfectly — maybe the lighting is off, your fingers are wet, or you're wearing a mask. If your biometric scan fails, don't worry:
You can try again — most devices allow multiple attempts.
If repeated attempts fail, Spendify will fall back to email verification — you'll receive a verification code to sign in, just like the standard login flow.
You're never locked out of your account because of a failed biometric scan.
Enabling and disabling biometrics
Biometric unlock is completely optional. You can enable or disable it at any time in Settings. When disabled, you'll simply use email verification codes to sign in.
For step-by-step instructions on setting this up, see our article on Enabling biometric unlock.
Why biometrics are a great security choice
Biometric authentication offers several advantages:
Unique to you — Your face and fingerprint are extremely difficult to replicate.
Convenient — No codes to type or emails to check for quick access.
Local — Biometric data is processed on-device, reducing the attack surface compared to credentials sent over the network.
Fast — Authentication happens in under a second.
