In an alternative sequence of four or six screens, each with a gallery of one recognisable face among eight random others, no key numbers are displayed. The advantage of using hidden keys is that the underlying digits that were previously known can be shuffled into different sequences on the pinpoint pad.
In current circs your phones passcode can be stolen either by hacking into the device remotely, or else by observation prior to its theft and misuse.
Using a system like that seen here, however, any gallery of faces can be shuffled endlessly ~ along with the underlying keys ~ so that no recognisable pattern of use can be seen.
2