Global cybersecurity standards are failing to protect users because they ignore the reality that 70 per cent of people share smartphone access with their partners.
A groundbreaking study reveals that while security experts preach a “one-user/one-device” approach, real-world relationships rely heavily on shared PINs, biometrics and unlocked devices.
The research identifies a critical blindspot known as the “Intimate Threat”, where current design principles fail to account for the risks posed by those closest to us.
The findings come from a comprehensive report by Griffith University and the Australian Communications Consumer Action Network (ACCAN), which surveyed nearly 1,000 adults in Australia to understand everyday usage.
It found that sharing is driven primarily by trust (53 per cent) and convenience (50 per cent). However, this openness creates significant vulnerabilities that standard security advice fails to address.
“It’s almost like an unspoken version of trust,” said one study participant.
Unvoiced assumptions
Despite the prevalence of sharing, boundaries are rarely set. Only 11 per cent of participants had discussed expectations for phone use with their partner, leaving the vast majority relying on unvoiced assumptions.
The report warns that this lack of boundaries can be exploited. While government threat models focus on external hackers and state-sponsored actors, a substantial amount of cybercrime is committed by current or former partners.
“In Australia, 20% of identity theft perpetrators identified by police were current or former intimate partners or individuals related to an ex-partner,” the report states.
The authors argue that the “all-or-nothing” access models currently used by smartphone manufacturers are inadequate for real relationships. They recommend making secure sharing settings the default and integrating intimate threats into core cybersecurity frameworks.
“The implications of the Intimate Threat Model underscore the need for greater transparency and control for smartphone users, allowing them to share what they want on their devices while maintaining their privacy,” the researchers concluded.