Face ID brings back a classic Macinstosh icon

The new protection technology of the iPhone X is related to our face through Face ID technology, a technology that is very more difficult to fail if we compare it with the fingerprint sensor, sensor that has completely disappeared in the iPhone with the Apple celebrates the launch of the first iPhone to the market.

Being Apple a company that does not like to look to the past, it is especially striking that the logo used in Face ID is especially familiar to Mac users who have been in the Apple ecosystem for many years. In almost all probability, Apple wanted to make a nod to the classic Macintosh.

Apple released the Face ID logo two days ago during the presentation of iPhone X to show the facial scanning functions of this terminal. The logo does not show a smiley face that appears three-dimensional, but is actually just a new version of the classic Happy Mac icon originally created by Susan Kare for the original Macintosh. Kare's iconic Happy Mac logo has undergone a number of revisions since its debut in the 1980s. The icon was inspired in part by the Batman Two-Face character. The Cupertino-based company originally used it to indicate that your Mac had booted up successfully. It is currently the icon for the Finder application on macOS.

The first impression received by users who followed the keynote was not exactly bad, since as soon as the Craig Federighi terminal was acquired, the recognition failed, although it may not be due to a functioning problem but to others such as the iPhone it just turned on and when this happens you need to enter the security code as we all know. Leaving aside this small incident, the different tests that the lucky ones who were able to attend the event have carried out show us how the operation is quite fast, but get used to the fact that we always have to look at the screen so that it can be unlocked.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Diego Rodriguez-Vila said

    Well, I see a very big security problem. Before, if the police took your phone from you, they couldn't unlock it without you putting your finger.
    Now, by opening it in front of you, they enter without you doing anything. I do not see it clearly.

    1.    Ignatius Hall said

      If you don't look at the screen, it's supposed to not unlock, but that's clearly the theory. We'll see the practice when it hits the market. Greetings.