Be careful! Don’t play with the face-swap app, it may make you borrow online

 Has your face been stolen?


With the development of image processing and artificial intelligence technology, we have begun to enter the "face-sweeping era", unlocking faces, withdrawing money, paying bills, sending express delivery, staying in stores, and taking high-speed trains. At the same time, many "face-changing" apps have become popular. Just move your finger and you can replace your face with that of a celebrity or friend...



In the coming "face-watching" era, life is becoming more and more convenient, and entertainment methods are becoming more and more diverse. But while "face-swiping" brings happiness, does it also bring enough security?


In February last year, a face recognition company in Shenzhen was confirmed to have a data breach. The core data of more than 2.5 million people could be obtained and 6.8 million records were leaked, including ID card information, face recognition images and GPS location records.



Also last year, a large-scale information leakage incident occurred in a European company, where the facial recognition information of millions of people was leaked. In September of that year, the Ministry of Industry and Information Technology conducted an inquiries and interviews with the popular face-changing app "Zao" regarding network data security issues...


Be careful! Don’t play with the face-swap app, it may make you borrow online

In addition to information leaks, criminals and data black-and-white industry practitioners are still illegally buying and selling facial information, and even a certain scale of "face industry" has been born in China.


According to media reports in July this year, some e-commerce platforms sold facial data matching identity information at a price of 0.5 yuan per copy. On the online trading platform, criminals sold illegally obtained identity information such as faces and "photo activation" network tools and tutorials in batches, selling them at a price of RMB 0.5 per face data and RMB 35 per set of modified software.


Be careful! Don’t play with the face-swap app, it may make you borrow online

There were also media reports in September last year that businesses publicly peddled "face data", the number of which was about 170,000, covering 2,000 portraits, with about 50-100 photos per person. In addition, a data file is provided to provide information such as gender, facial expression, facial value...


Be careful! Don’t play with the face-swap app, it may make you borrow online

Why would anyone steal our face information? What are the consequences after this information is leaked? It may be beyond your imagination.


What are the consequences of "humiliation"?

Face recognition obtains facial information through a camera, and then converts the facial information into computer code. These extracted data will be stored in the enterprise database.


Human faces cannot be copied, but the code can be obtained and reconstructed. Common characters and string passwords can be set to new passwords after they are lost, but human faces cannot be "reset", and it is difficult to retrieve them once they are leaked.


If the face information is lost, the consequences may be unimaginable.


Lose money


Most banks and other financial institutions have opened face recognition login APP functions. Scenarios such as "swiping face" payment and even remote signing are becoming more common. If the user's "face" is not safe, "money" will also face greater risks.


"Throw innocence"


Some websites use the "face-changing" method to provide videos "grafted" with the artist's "face", which are often suspected of pornography, and it is difficult to distinguish true from false. Malicious splicing and production of insulting and offensive view materials for illegal dissemination and utilization. Use the face information of the lender to carry out illegal collection activities with such technologies, and even other serious criminal activities such as extortion.


"Be loaned"


Many online lending institutions still use manual review or low-tech machine review. Once the facial recognition information is mastered by criminals, the faces that are "lived" with black technology are likely to be fake and real, and uninformed persons are "loaned" on the Internet. Carry a huge debt.


Violation of portrait rights


Users upload and publish user content related to celebrity portrait rights, but it is difficult for ordinary users to obtain the celebrity’s portrait rights authorization license, and it is easy to cause portrait rights infringement. According to the content of the agreement, users will bear corresponding infringement liability for these actions.


Copyright infringement


my country’s "Copyright Law" expressly stipulates that the copyright of film and television works shall be enjoyed by the producer, and at the same time he shall also enjoy the right to protect the integrity of the work, that is, the right to protect the work from distortion and alteration. The user replaces the celebrity's avatar through the APP, infringing on the producer's copyright to protect the integrity of the work.


Make fake news


On some major occasions, the negative impact of the misleading of fake news on the people is immeasurable.


How to protect our "face"?

In response to the use of information technology to "deeply falsify" the portraits and voices of others, infringe on the personality rights of others, and even endanger the public interest, the "Civil Code of the People's Republic of China", which will be implemented next year, clearly states that no organization or individual may use Demonize, deface, or use information technology to infringe others’ portrait rights.


The "Regulations on the Management of Network Audio and Video Information Services" that came into effect on January 1 this year also stipulate that AI fake audio and video must not be arbitrarily released, and must "carry out security assessments in accordance with relevant national regulations" and "mark them in a significant way."


For us, we must do the following in our daily life to protect our information security.


For some services that require uploading, holding ID photos or videos, you should be vigilant;


Do not download or use applications of unknown origin, and avoid using unfamiliar Wi-Fi without security protection;


Sensitive people who use iris to verify their identity should not upload photos to the Internet at will, and do not easily accept others' requests to take photos.


When facial recognition is set as the property account password, other verification methods should be set at the same time to reduce the risk.

Comments

Popular posts from this blog

Fresh and spicy, easy to use! Milk Mala Tang for soup

Secret Hubei Tour: Enshi Earth Heart Valley, named "China's Most Beautiful Wonderland" by CNN

To make sauerkraut fish, whether to put sauerkraut or fish first, 10 makes 9 people wrong, no wonder the fish is heavy and not fresh