Skip to main content

MyColorado App Review 


 The myColorado app is an app that allows its users to have a digital copy of various documents that they would normally carry with them in their car or person. If you are a person that carries minimal items at all times this is a great app for you to have. The documents that are available for digital carry-on the app are your Colorado state ID, covid19 vaccination record, Colorado parks and wildlife licenses, car registration, and car insurance. All of these documents are in one convenient place, The myColorado app. This app comes in handy when you might forget your wallet or are going on a long hike and want to save on weight.

Once you can confirm your identity and log in the app offers more options for you to take advantage of. The main purpose of the app is to give the user access to important Colorado documents. There are other resources the app provides links on how to renew your license, shop for Colorado parks and wildlife, and other helpful things that you might need to deal with the state. The app is compatible with both iOS devices and Android users. The user interface is easy to navigate, very intuitive, and simple so the user does not feel overwhelmed or feel like there is a lot of experimenting with it.

app main page

Although the app does make it convenient to have these documents in one location, the app is there to complement the physical copies that you should carry around until the digital forms are accepted everywhere. Certain places will not allow you to use a digital ID like when you are trying to purchase a firearm. There is fear that some of the documents can be replicated or falsified. Another problem that could arise from this app is someone using someone else login credentials to pretend to be them for nefarious reasons. The app does use multi-factor authentication every time you need to log in for added protection.

The first recommendation I have for this app is the initial login process could be easier to get through than the way it is now. The app asks to use the camera to try to identify your facial features, but this process seems to fail often and doesn’t work for everyone. The problem that can arise from this is that if the person does not look like they did when their ID picture was taken. My process was difficult and was surprised that it worked because I do not look like my ID picture. I have since then grown a beard and changed my hairstyle it was only after two days of trying that I got past the authentication process. I understand the reason behind why it is done this way so they can see who is trying to gain access to the ID. Once this process is done with you only need to log in with your user ID and password.

The second recommendation that I have for the app should allow you access to your ID without some sort of internet service. The app should be able to store your credentials on your mobile device for you to access the documents you need in case it is the only form of identification you carry. Having access to this can help you if you are ever questioned by authorities* and all you have on your person is your phone. Having these documents could be used as well if they are stolen or lost. There are many reasons you could use these documents on your phone without internet service.

The third recommendation I have for the myColorado app is limiting the number of times one has to log in to have access to these documents. The app automatically logs you out and you have to log in with the multi-authentication factor as well. If you do not have internet service, you will not be able to log in and have access to your documents. Sometimes service can be limited on your cell phone making it impossible to log in to the app so staying logged in would illuminate the hassle of login in often. If the app would let you know when you need to log in you could be proactive and login if you know you will not be able to later when you need access to these documents.

login page

 

*I do not recommend handing your phone to the authorities for any reason and I recommend that you have your device locked with a secure password.

Comments

Popular posts from this blog

  Network Security Connection             Network security is very important in today’s world, and it will continue to be an essential part of the future of the cyber world. With each new technological advancement, there is a threat that arises that is set in motion to try and exploit that new technology. From the dawn of the first home computers, some seek to use those same systems with malicious intent. Cybercrime is the fastest-growing form of criminal activity (Vahid & Lysecky, 2017). The growing rate of cybercrime means there must be people at the forefront trying to protect against it and it starts with protecting networks as well as devices that are in use. Network security is a cornerstone to any computer database and this security needs to stay prepared for any cyber threat that will try to take advantage of its users.            Having a reliable network requir...
Information Highway  Sending and receiving information on the internet does have its snags at times and having ways to help determine what causes them can help make that information travel better. I have used ping and traceroute extensively due to my line of work. I work for an internet service provider and running ping tests can come in handy when a customer is experiencing slow internet speeds. When you run a ping test to a certain destination you are sending packets to that place and awaiting a response. This can help determine if the line of communication to that destination is a clear one and if there isn’t a clear route for that packet it can be lost. If the packet of information doesn’t make it to its destination it could be resent causing a slight delay to that information. Traceroute is used to see the number of places a packet must hit before reaching its destination. Each server it hits is marked down along with the amount of time it took to reach that server. I did a ...
 Network Security      There are several security threats to those that jump on any network even when it isn’t connected to the internet. The number of computing devices out there can all be targeted and if these threats are not checked the damage can be very costly. The threats to one’s network, devices, and even information come in many forms. These threats are serious but there are a few tried and true methods to help avert them. This paper will cover two specific threats in detail as well as outline some protective measures to help.            One of the threats that are very popular in the cyberworld is called phishing. Phishing is a scam that runs on the internet to try to exploit a user’s sensitive information (Vahid & Lysecky, 2017). These types of threats are mainly targeted at a specific user of a device that can connect to a network or internet. Once a breach has happened the user’s information can be...