Connect with us
Clearview AI will soon receive a patent for face recognition Clearview AI will soon receive a patent for face recognition

Security

Clearview AI will soon receive a patent for face recognition technology

Published

on

Human rights activists fear that the patent will accelerate the growth of such technologies before lawmakers have time to foresee all the risks.

Clearview AI’s patent application for facial recognition technology has been approved by the US federal government.

The software developed by Clearview scrapes publicly available images on social media and allows law enforcement agencies to match their databases or CCTV images. However, human rights defenders fear this technology, because it uses people’s faces without their knowledge.

Civil rights organizations believe that facial recognition technologies can be wrong, often misidentify women and minors compared to white men, and sometimes lead to the arrest of innocent people.

Now, some advocates fear that Clearview’s patent acquisition will accelerate the growth of such technologies before lawmakers and regulators have time to foresee all the risks.

According to Politico, Clearview received an official patent notice from the United States Patent and Trademark Office on December 1, 2021. This means that the patent will be approved as soon as the company pays the administration fee. The patent covers “methods for providing information about a person based on face recognition” developed by her, including an “automatic web crawler” that scans social networks and other Internet resources, and its algorithms for analyzing and comparing the received images of faces.

“There are other patents on facial recognition technology, but this is the first to use data from around the Internet,” said Clearview co-founder and CEO Hoan Ton-That.

According to the CEO, his company’s product uses a database of more than 10 billion photos. As Hon Ton-That noted, “As a mixed race person” it is very important for him that the technology is “unbiased.”

Clearview technology is widely used by law enforcement agencies in the United States, including the FBI and the Department of Homeland Security. At least ten federal agencies intend to expand the use of facial recognition technologies over the next two years.

Australia and the UK have accused Clearview of violating data protection laws.

Last year, Clearview technology also outraged major social networks Twitter, Google, YouTube, LinkedIn and Venmo, which even sent a notification to the company demanding to stop furring photos and data of users of their platforms. Facebook, which recently announced that it would stop using its own facial recognition system, asked Clearview to do the same.

In turn, representatives of Clearview insist that the First Amendment to the US Constitution allows the use of publicly available materials.

“All information in our datasets is publicly available, users voluntarily published it online, these are not photographs from personal photographic film. If it was confidential data, then it would be a different matter, “- said the head of Clearview.

Click to comment

Leave a Reply

Your email address will not be published.

Phones

It turned out that even a turned off iPhone can be hacked

Published

on

It turned out that even a turned off iPhone can

Researchers at the Technical University of Darmstadt in Germany have found that the iPhone can be at risk even when turned off.

When iPhone is turned off, most wireless chips, including Bluetooth, NFC, and Ultra-Wideband (UWB), continue to work for up to 24 hours. So the phone can still be found through Find My and you can still access credit cards and digital keys. These wireless chips have direct access to the secure element and can be used to install malware on the iPhone even when iOS is down.

Wireless chips operate in low power mode (Low-Power Mode, LPM). This is not to be confused with Power Saving Mode, which extends battery life. LPM support is implemented in hardware, which means that this issue cannot be fixed with a software-side fix.

It turned out that even a turned off iPhone can be hacked

Researchers conducted a security analysis of the LPM features introduced in iOS 15 and found that the Bluetooth LPM firmware could be modified to run malware on the iPhone. These loopholes have not been previously considered and could allow hackers with system-level access to track someone’s location or trigger new features on the phone. The problem seems to stem from the fact that LPM features were designed with functionality in mind, and there seemed to be little attention given to possible threats outside of the intended applications.

Disabling Find My turns turned off iPhones into tracking devices, and the implementation in the Bluetooth firmware is not immune to manipulation. Tracking properties can be surreptitiously modified by attackers with system-level access.

Ars Technica notes that most iPhone users have nothing to worry about, since a jailbroken iPhone is required to infect third-party software. However, the security hole can be exploited by spyware such as Pegasus.

The results of the research were transferred to Apple, which did not comment on the situation.

Continue Reading

Components

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining. Nvidia LHR v3 security cracked 90%

Published

on

The GeForce RTX 3050 can now also be almost fully

A couple of weeks ago, the LHR protection in Nvidia graphics cards was cracked, which allowed everyone to use accelerators for Ethereum mining at full capacity again. But in fact, then the protection of LHR v2 was cracked, but not LHR v3.

The GeForce RTX 3050 can now also be almost fully used for Ethereum mining.  Nvidia LHR v3 security cracked 90%

The LHR v3 version is present in Nvidia’s latest releases: RTX 3050 and RTX 3080 12GB. And it is still not completely hacked, but now the NiceHash miner is able to use 90% of the performance of these cards when mining cryptocurrency. It’s not a complete hack yet, but it’s getting very close.

Fortunately, at the moment the cryptocurrency market is in a state of decline, so it hardly makes any sense to buy the same RTX 3050 for mining, which means that gamers need not worry for now.

By the way, a large article has been published on our website with an analysis of methods for cracking Nvidia protection.

Continue Reading

Security

Nvidia lost. LHR mining protection is also hacked under Linux. This was done by NBMiner developers

Published

on

Nvidia lost LHR mining protection is also hacked under

Two days have passed since the NiceHash developers cracked the Nvidia LHR protection, as the NBMiner team also pleased their users with the same news. Only this time we are talking about software for Linux.

Nvidia lost.  LHR mining protection is also hacked under Linux.  This was done by NBMiner developers

Thus, Nvidia’s protection completely fell for both Windows and Linux. Unfortunately, both programs are closed source, so it’s not clear what mechanisms the developers used to hack.

Whether the loss of Nvidia will affect the availability and prices of video cards is still difficult to say. At the moment, the cryptocurrency market continues to fall, but sooner or later it will turn around, and gamers may again face shortages and overpriced graphics cards.

Continue Reading

Most Popular