In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
2020-07-18 13:03:04
Alphabet, the parent company of Microsoft, Amazon and Google, was sued together for Face Recognition.
The plaintiffs, two residents of Illinois, argued that the three companies used their face data to train models for Face Recognition and profit from it.
The face data comes from IBM's Diversity in Faces dataset, which was collected on a photo website called Flickr without permission (without informing the author and subject that their photos would be used for facial recognition).
The appeal is based on Illinois 'Biometric Information Privacy Act (BIPA) passed in 2008.
This isn't the first time big companies have been sued under the bill. In January 2019, Six Flags was fined by the Illinois Supreme Court for collecting fingerprint information from 14-year-olds.
Microsoft says it has received complaints and is reviewing them, but Google and Amazon have yet to comment.
In fact, before Face Recognition technology was popularized, collecting face data did not attract much attention.
However, with the rise of AI, biometric recognition tools widely enter people's field of vision, and the contradictions faced by Face Recognition gradually emerge.
Privacy security or business needs? Face Recognition Involves Infringement of Privacy
Under the surveillance of the Internet, it seems no surprise to be a "transparent person."
Whether it is facial information, fingerprints and voice entry, our personal information will be revealed imperceptibly.
Face Recognition technology has been strongly opposed by privacy activists and Biometric Information Privacy Act lawmakers in the United States, with a few cities banning its use in municipalities.
Last year, Democratic lawmakers proposed banning the use of Face Recognition in the public housing sector.
A Microsoft spokesperson said: "We take privacy very seriously and we are committed to ensuring that our AI technology is developed and used responsibly. "
But Face Recognition isn't just about privacy violations.
In addition, Face Recognition technology itself also has security risks.
Face Recognition Has Potential Safety Hazards
At the end of last year, an AI company called Kneron "cracked" WeChat, Alipay and airport Face Recognition systems.
The Ali-invested company team, using 3D printed high-definition molds,"cheated" Alipay and WeChat's Face Recognition payment system and successfully purchased goods.
Not only three-dimensional Face Recognition systems can be fooled by 3D models, but two-dimensional Face Recognition systems can also be breached.
At Schiphol Airport, the largest airport in the Netherlands, the team "fooled" a self-service check-in terminal with a photo on their mobile phone.
In fact, photos or videos generated using GAN (Generative Adversarial Network) can even fool most current 2D Face Recognition systems.
When the report first came out, Kneron explained that the 3D molds used were produced by professional companies, expensive and unlikely to be widely used, so there was no need to worry too much about the risk of property leakage.
But in recent days, Xinhua Agency has reported that criminals use Face Recognition to commit crimes, and the cost of crime is much lower than expected.
Criminals don't need to have a 3D mold, a tool of dozens of dollars, plus a front-facing photo of a few cents, to fool the Face Recognition system.
According to the report, these black industries can unseal WeChat and use Alipay accounts by reselling illegally obtained face information and a network toolkit called "photo activation" in batches through e-commerce platforms.
This "photo activation" toolkit can modify static face photos into dynamic face verification videos. The original motionless face can also blink, open mouth and nod under the action of tools.
This will indeed trigger a crisis of trust in Face Recognition technology.
If faces are collected, not for academic research, but may be resold in some illegal channels and used by lawbreakers to steal property using Face Recognition, it will indeed deepen people's panic.
However, advocating privacy and banning the use of Face Recognition technology does not seem to be the best way to solve this problem.
After all, Face Recognition technology has also made a lot of contributions.
Low business costs, wide demand
For some stores abroad, Face Recognition technology helps them quickly identify "repeat offenders" in the store or criminals with a history of theft.
If Face Recognition technology can be applied to video surveillance, the shopkeeper's losses can indeed be reduced.
At the same time, U.S. police have also purchased Face Recognition systems for security monitoring, hoping to use this technology to arrest some of the criminals still at large or track related violations.
Face Recognition technology itself is also being applied by more and more commercial companies because of its decreasing cost and higher popularity.
coping strategies
Of course, the relevant laws and regulations are already being improved in China.
The Civil Code, which will come into force next year, specifies the scope of natural personal information, including biometric information.
In addition, the network platform should also be responsible for the supervision of transactions occurring within the platform.
If you have uploaded a clear hand-held ID card photo, or uploaded a face photo and ID card bank card information at the same time, you can select multiple verification methods while enabling face verification to reduce the risk of single face verification.
Reference link: www.cnet.com/news/amazon-google-and-microsoft-sued-over-photos-in-facial-recognition-database/https://mp.weixin.qq.com/s/MtuC4rP_A2REgTqVzOIWGA
- End-
http://blog.sina.com.cn/s/blog_cfa68e330102zvrb.html
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.