Widespread belief is that finger, face, and voice authentication are the epitome of security. But those technologies a