Current location - Loan Platform Complete Network - Big data management - Merchants peddling 170,000 "face data", why our "face" has become a "commodity"?
Merchants peddling 170,000 "face data", why our "face" has become a "commodity"?

The combination of technology and people is worrying when face data is being peddled openly, coupled with the constant refinement of deep forgery techniques such as "face-swapping" and "voice-swapping".

With the application of face recognition technology in the field of security, payment and other areas, many people enjoy the convenience of life brought about by "brush face". But the emergence of AI face-change software has aroused the public's uneasiness: when the face is "data-enabled", it seems that it is no longer unique to me, but can be restored through the data at any time, anywhere, which will lead to some kind of "out of control"? Yesterday's news intensified that concern.

According to media reports, some merchants have been selling 170,000 pieces of "face data" on an online store. The report said the "face data" covered the portraits of 2,000 people, and in addition to information on the location of the face, there were also information on the contours of 106 key points of the face, such as the eyes, ears, nose and so on. Among them are celebrities and ordinary citizens, as well as some minors. Some of the people involved said they had no idea that their "face data" was being collected and sold.

The shopkeeper said he was usually engaged in artificial intelligence-related work, so he collected a lot of face data and put it on sale to make money, and did not provide information such as the person's name and ID number. After the reporter reported, the goods were taken off the shelves. A lawyer said, this move has been suspected of violating the privacy of others.

On the one hand, face data is unknowingly collected, online, and traded; on the other hand, the depth of forgery technology, such as "face-switching", is constantly improving, making it difficult to distinguish between the real and the fake. And, not only the face can be forged, even the voice can be "cloned". Recently, there are media reports, fraudsters use artificial intelligence voice generation software, successfully imitated and impersonated the CEO of the German parent company of a British energy company, to deceive his colleagues and partners "transfer" up to 220,000 euros.

In fact, whether the AI face-swapping software was questioned, interviews, or face data was openly peddled, has fundamentally touched the bottom line of people's privacy: when the face, the voice can also be "deep forgeries", then what evidence to identify the real?

If the cracking of a person's fingerprints is a cracking of the physical entity, then the cracking of faces and voices is a cracking of the person's data. This means that in this era of high dependence on the Internet, as long as you can simulate a person's appearance, voice, criminals can complete a series of "personal real behavior" in the network world. The consequences of this are too much for the average person to bear.

To effectively prevent video and voice fraud, the core issue is to effectively protect people's privacy.

For individuals, the key is to establish a sense of privacy protection. Before the domestic public generally lack of "privacy concerns", the issue is not sensitive enough, and now with more and more personal privacy related things, more and more related to personal interests, people's corresponding awareness of privacy protection in the enhancement, but to be more serious and the use of legal weapons to defend the rights of the "concept of the water level "The company's website has been upgraded to include the following

And for companies storing users' data privacy, they need to strengthen technical means for "risk isolation" by raising the technical threshold for lawbreakers to steal personal information, thus reducing the economic value of illegal information acquisition. The relevant platforms may also want to strengthen monitoring and establish automatic alarm mechanisms for "sensitive commodities" to prevent such information from being openly peddled.

Of course, the most important thing is to rely on the timely updating of data protection-related laws, and to crack down on illegal and criminal activities, so as to build a strong judicial wall for the protection of personal privacy.





Data protection is a key element in the protection of your personal data, including your personal data, and your personal data.