Joke Collection Website - Public benefit messages - Secretly collecting face data has reached hundreds of millions. Is our face still safe?
Secretly collecting face data has reached hundreds of millions. Is our face still safe?
The face data collected quietly has reached hundreds of millions of people, and the data can also show people's age, gender, hobbies and economic level, which is simply outrageous.
So, is our current face recognition technology still safe?
It is suggested that the State Council should enact the regulations on the protection of natural persons in face recognition technology as soon as possible to protect people's privacy and property from infringement.
Any new thing, high technology is a double-edged sword.
It not only created superior conditions for our life, but also observed the dribs and drabs of our life, and each of us became a transparent person.
High-tech tracks our whereabouts and knows our privacy like the back of our hand. At present, we have no privacy about new technologies.
What is even more frightening is that each of us, a natural person, is used by criminals to cheat, which will cause losses to people all over the world.
Yesterday, an individual industrial and commercial household registered in the Industrial and Commercial Bureau received a short message with his name written on it, asking him to enter the industrial and commercial website sent to him before 18 to verify his industrial and commercial license online.
Individual industrial and commercial households believe that electronic verification is convenient for everyone during the epidemic.
Individual industrial and commercial households click on the sent website and enter their names, verification codes and bank card numbers according to the procedures. A few minutes later, 3000 yuan in his account was transferred away.
Individual industrial and commercial households are still wondering, there is a charge for verification, and I can't control it if I charge 3000 yuan.
He called his son, and his son reacted immediately and told him that he had been cheated. He suddenly realized that it was no wonder that he had to enter the verification code. Only by losing the verification code can the money be earned by the liar.
But he still can't figure out why even a liar knows his name.
Who sent the registered name of the industrial and commercial bureau to the liar?
In this world, this kind of liar is really ubiquitous and hard to prevent.
Damn liar, is it that easy for ordinary people to make two dollars in a small business?
Liars cheat money everywhere, spend a few cents to buy information about individual industrial and commercial households, and there must be insiders who register their names online and sell this information to scammers.
This can explain that many people go to the hospital for a check-up, and immediately someone will give you nursing guidance, send moon cakes, baby milk powder and baby clothes. These materials have been sold to these people.
Face recognition is a biometric technology for personal identification based on facial feature information. Specifically, the computer obtains the facial image of the recognized object through video acquisition equipment, and then uses the core algorithm to calculate and analyze facial features such as facial features, face shape and angle, and then compares them with the existing templates in the database, and finally judges the real identity of the user.
"Simple face recognition may need to collect and extract six or eight key points on the face and compare them with the points in the database. If you compare them, you can identify them. Face recognition is not for safety but for convenience. " Xiang Ligang, a communications industry observer, said.
Yu Jianing, deputy director of the Blockchain Committee of China Communication Industry Association, said in an interview that the large-scale commercialization of biometric technology represented by face recognition has indeed brought a lot of convenience to economic and social operations and people's lives, but biometric information belongs to social basic resources and has the characteristics of lifelong invariance. In the process of collection, transmission, storage, use and third-party call, there may be data leakage and abuse, which will bring additional risks to the normal operation and development of society.
Yan Xiaoli, deputy director of the Network Security Research Institute of China Electronic Information Industry Development Research Institute, believes that face data, as highly sensitive biometric information, is immutable, and once it is over-analyzed and abused, it will infringe on personal privacy and other rights. For example, without personal consent, face data is collected through cameras and smart devices connected to the face recognition system, and analyzed by using machine learning and other technologies. Personal "portraits" will obtain personal information such as personal whereabouts and behavioral characteristics.
Over-analysis of face data has occurred at home and abroad. The United States and some European countries have restricted the use of face recognition technology for fear of being abused. In practice, collecting face data without personal consent or in unnecessary scenes, as well as large-scale leakage caused by improper management, may lead to further abuse of face data, thus infringing on personal privacy.
Through the collection and processing of face information, the complete three-dimensional information of the individual is displayed. If abused, it is tantamount to each of us streaking in the crowd. This is a great invasion of personal privacy. To protect the information security of personal privacy data such as face data, the system construction should go ahead. Promulgate data security law, personal information protection law and other laws as soon as possible; Important industries and fields will speed up the formulation of implementation rules and guidelines to guide industry enterprises to strengthen data security management. At the same time, we should vigorously develop data security technologies and industries. Support enterprises such as network security to develop key technologies such as differential privacy technology, multi-party secure computing, data monitoring and traceability, and cultivate services such as data security consulting, data protection design and data security management.
In the information age, personal privacy exists in name only. With the advent of the 5G era, our life is more based on the Internet. However, the more developed the Internet, the more open personal privacy becomes.
- Related articles
- How long can the violation of electronic eyes be detected? How many days can it be detected?
- Where can I find the classic SMS ringtone of Apple mobile phone?
- How to comfort friends and relatives who are sick
- I bought something from Taobao before, and today I received a customer service message saying that the evaluation needs to be evaluated. Is it important?
- The SMS center number has been deleted.
- What is illegal to insult the police?
- Eight methods of actual combat nunchakus
- Is it illegal for WeChat to work part-time?
- It has been 10 days since the interview of a state-owned enterprise ended, and no notice has been given. Is there a play?
- How to transfer the verification of Weizhong bank account to 0.0 1 yuan?