There are those who steal money,
Whoever steals something,
You've heard of it,
Is there a "face stealing"?

"Stealing face"??
1
What is "stealing face"?
With the commercial application of face recognition technology, more and more fields have begun to use face verification, face brush payment and other methods to ensure security.
However, in the process of authorized collection, a large number of commercial entities, in order to reduce their own costs, "force" the public in a weak position to give out their own facial information through standard terms or unilateral notices, and even in the contract agreement, they imply self-exemption clauses.
In addition, criminals and data black and gray industry practitioners need corresponding face information in order to pass real-name authentication and achieve the purpose of registering false accounts or directly infringing on other people's accounts, and even have spawned a certain scale of "face industry" in China.
Some time ago, the official micro of the life newspaper reported that Guo Mou from Hangzhou encountered a "face stealing", and on October 17, Guo received a text message from Hangzhou Wildlife World. The text message said: Annual pass customers need face recognition to enter the park,
As a doctor of law, Guo Mou was unwilling to accept the face information collected and asked to return the card and was rejected. On October 28, he took Hangzhou Wildlife World to court.
On November 1, the case, which was called "the first case of Chinese face recognition" by the media, was officially filed.
Coincidentally, not long ago, a face-changing software brushed the screen, uploaded photos, you can replace the star to appear in the production of related films and television, really let people live a "star addiction".
However, the APP quickly caused controversy, and some netizens found that its APP user agreement was overbearing, worried about being "stolen face".
This is not a cause for concern, after the China Consumers Association released the "100 APP Personal Information Collection and Privacy Policy Evaluation Report". The report shows that 10 of the 100 apps (APPS) evaluated are suspected of excessive collection of personal biometric information!
2
How serious are the consequences of being "stolen face"?
Face recognition is to obtain face information through cameras, and then convert face information into computer code, and the extracted data will be stored in enterprise databases.
Faces cannot be copied, but code can be fetched and refactored. Normal character and string passwords, after losing, you can set a new password. But a person's face cannot be "reset", and once it is leaked, it is difficult to retrieve it.
3
Other disclosures of personal biometric information are also a cause for concern
From passwords to fingerprints, from face recognition to iris recognition, and even to everyone's genes, after the leakage of these biological information, user identity security will be like "naked running"!
If, combined with the latest 3D printing technology, it may be possible to be impersonated by the "Li Ghost" in real life, bringing major risks to everyone's people and property!
In February 2019, a face recognition company in Shenzhen was confirmed to have suffered a data breach, and the core data of more than 2.5 million people was accessible!
6.8 million records were leaked, including ID card information, face recognition images, GPS location records, and more!
4
How to prevent it? Don't do these few things!
Attention
1. Don't post photos with your fingerprint information on the Internet, and don't enter your fingerprints on untrusted devices. After using the fingerprint lock or mobile phone, rub it with your hand on the surface of the sensor, through this action, the fingerprint image will be completely blurred, and there will be no extraction value;
2. Be vigilant about some services that require uploading photos or videos of handheld ID cards;
3. Do not download or use applications from unknown sources, and avoid using unfamiliar Wi-Fi without security;
4. Sensitive people who use iris to verify their identity, do not upload photos to the Internet at will, and do not easily accept the request of others to take photos.
Biometric Information
Personal information is secure
The last line of defense
Be vigilant!
Source: Communist Party Member People's Daily
Edit: Beanie