background preloader

How to camouflage yourself from facial recognition technology

How to camouflage yourself from facial recognition technology
The day when you’ll be able to hold up your phone and identify a stranger through a viewfinder is getting closer. Google’s Goggles, a mobile app for visual search, has a facial recognition version unreleased to the public, while Israeli startup’s technology can tag people’s faces in Facebook photos. Facebook even released a basic version of face detection last night, although it doesn’t have recognition. So in a world where technology chips away at our ability to remain anonymous, how does one reclaim some semblance of control? It turns out there’s actually a pretty simple way around the facial recognition technology available in the market today, according to Adam Harvey, a graduate student at NYU’s ITP (the same program that produced Foursquare chief executive Dennis Crowley and that Twitter’s location guru Raffi Krikorian taught at). “It breaks apart the gestalt of the face,” he said. Harvey says there a couple of projects that could stem from idea. Related:  Augmented Reality

THE EXILED Brings Facial Recognition to the Masses, Now with Age Detection: Interview With CEO's API now returns an age estimation for faces it detects in photos - seen here with some recognizable examples. Looking at someone’s face can tell you a lot about who they are. Running a picture through‘s systems let’s you turn those instincts into cold hard data. Instead of trying to understand what makes someone look a certain age, simply let their program figure it out on its own. does a pretty good estimation for this pic of Brad Pitt. In the end, though, the only really important thing to ask about’s Age Detection, is “does it work.” The near term applications for the update show how useful it might be. What seems certain is that we will see much more of in the future. That means to some extent that we already live in the era of ubiquitous facial recognition, and is one of the companies that brought us there. [image credits:] [source:, Gil Hirsch]

Developments in Facial Recognition Eventually, it will work. You'll be able to wear a camera that will automatically recognize someone walking towards you, and a earpiece that will relay who that person is and maybe something about him. None of the technologies required to make this work are hard; it's just a matter of getting the error rate down low enough for it to be a useful system. The police want this sort of system. A small camera fitted to the glasses can capture 400 facial images per second and send them to a central computer database storing up to 13 million faces. In the future, this sort of thing won't be limited to the police. Of course, there are false positives -- as there are with any system like this. In Boston, someone erroneously had his driver's licence revoked: It turned out Gass was flagged because he looks like another driver, not because his image was being used to create a fake identity. IEEE Spectrum and The Economist have published similar articles.

Google Glass: Artificial Unconscious? : Neuroskeptic Google Glass is cool. But could it be philosophically dangerous? 60 years ago, Ludwig Wittgenstein famously wrote: Where does this idea come from? The “idea” in this case was a particular philosophical theory about language. Perhaps all technology so far has been an extension of the conscious parts of our mind. Google Glass and other smart glasses do all that as well, but I wonder if they’ll soon go one better: they could extend or modify our unconscious mental processes. Consider, for example, some smart glasses set up to detect anything that looked like a spider in front of its camera, and overlay it with a red flashing box on the user’s display if spotted. Now, I think this would make you obsessed with spiders. Or again, your glasses could analyze the facial expressions of people you meet, perhaps displaying the results (85% happy, etc…) floating above their heads. These examples are just for illustration.

Statement from Jeremy Regarding His Plea Statement from Jeremy Regarding His Plea Today I pleaded guilty to one count of violating the Computer Fraud and Abuse Act. This was a very difficult decision. I hope this statement will explain my reasoning. I believe in the power of the truth. During the past 15 months I have been relatively quiet about the specifics of my case as I worked with my lawyers to review the discovery and figure out the best legal strategy. Now that I have pleaded guilty it is a relief to be able to say that I did work with Anonymous to hack Stratfor, among other websites. I have already spent 15 months in prison. I would like to thank all of my friends and supporters for their amazing and ongoing gestures of solidarity. Jeremy Hammond

10 | 48 Crazy Ideas Coming From The $2 Billion Stealth Startup Magic Leap Last October, Fast Company broke news about a stealth startup named Magic Leap that had raised $542 million in a round of financing led by Google. Names attached ranged from the mobile hardware makers at Qualcomm to the special effects studio Weta. But what the heck were they building? Augmented reality (AR) glasses were our best guess. Now, Magic Leap has begun filing patents, which give us a much better look at their plans. Glasses? Their latest application is a 180-page opus for user interface, filled with a surplus of imaginative sketches illustrating the platform’s potential. The hardware appears to be a pair of glasses with fiber optic projectors. Hand gestures within your line of sight can pull up menus and issue commands. Here we see the first of many "totems" in the documentation. Totems can be dumb, non-descript objects in the real world, but painted with a digital skin in Magic Leap's augmented world. Totems can also take the form of controllers. Pinch-to-zoom? [via the Verge]

UniBeast: Install Mac OS X Lion Using an All-In-One Bootable USB Drive STEP 1: Purchase Mac OS X Lion The operating system is not free. There are two ways to purchase your copy of Mac OS X Lion. STEP 2: Create a Bootable USB Drive Using UniBeast Take a deep breath and take your time- this is pretty simple, but it's easy to miss things if you rush. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 14. 15. 16. 17. 18. 19. 20. The process will take about 10-15 minutes, depending on system and drive speed, but will show hours. STEP 3: Install Mac OS X Lion You're almost done! 1. 2. 3. You may have to type extra command line flags to reach the installer. 4. If updating an existing Snow Leopard install, skip 5-14. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 17. 18. 19. STEP 4: Post-Installation Using MultiBeastMultiBeast is an all-in-one post-installation tool designed to enable boot from hard drive, and install support for Audio, Network, and Graphics. 1. If your drive doesn't boot on its own, and you get an error referencing boot0, fix it using the methods listed here.

When You Don’t Own Yourself In the short time that Social Roulette was active, 393 people pulled the trigger. Given the 1 in 6 odds, approximately 65 people should have had their accounts deleted. In fact, all 393 people survived. One side of Social Roulette is about discomfort with social networks, or ambivalence about digital identity. This manifested in the tweets and posts from people bashing Facebook or daring each other to play. A few weeks ago, on April 20th, I saw Friend Fracker , a piece from Harper Reed and Rafael Lozano-Hemmer developed during Rhizome’s 7 on 7 conference. In 2009 the Web 2.0 Suicide Machine and Seuppukoo gave you the chance to delete all your social network activity and your account. Deleting an account is one thing, but playing games with it is another. I started researching the process of Facebook profile deletion, but was dismayed to discover how difficult the process was. This made me feel like my information was hardly mine to delete by hand, much less in an automated way.

Become a Programmer, Motherfucker If you don't know how to code, then you can learn even if you think you can't. Thousands of people have learned programming from these fine books: Learn Python The Hard Way Learn Ruby The Hard Way Learn Code The Hard Way I'm also working on a whole series of programming education books at Learn C The Hard Way Learn SQL The Hard Way Learn Regex The Hard Way Graphics Programming Language Agnostic NerdDinner Walkthrough Assembly Language Bash Clojure Clojure Programming ColdFusion CFML In 100 Minutes Delphi / Pascal Django Erlang Learn You Some Erlang For Great Good Flex Getting started with Adobe Flex (PDF) Forth Git Grails Getting Start with Grails Haskell Java JavaScript JavaScript (Node.js specific) Latex The Not So Short Introduction to LATEX (perfect for beginners) Linux Advanced Linux Programming Lisp Lua Programming In Lua (for v5 but still largely relevant)Lua Programming Gems (not entirely free, but has a lot of free chapters and accompanying code) Maven Mercurial Nemerle Nemerle

Reporters use Google, find breach, get branded as “hackers” Call it security through absurdity: a pair of telecom firms have branded reporters for Scripps News as "hackers" after they discovered the personal data of over 170,000 customers—including social security numbers and other identifying data that could be used for identity theft—sitting on a publicly accessible server. While the reporters claim to have discovered the data with a simple Google search, the firms' lawyer claims they used "automated" means to gain access to the company's confidential data and that in doing so the reporters violated the Computer Fraud and Abuse Act with their leet hacker skills. The files were records of applicants for the Federal Communications Commission's (FCC) Lifeline subsidized cell phone program for low-income consumers. Vcare and the telecom providers are explicitly required to not retain this data under the regulations of the FCC program. Scripps News' Isaac Wolf contacted the chief operating officer of TerraCom and YourTel for an interview.

Privacy on the Line: Security lapse exposes some Lifeline phone customers to ID theft risk Last fall, when Linda Mendez was offered discount phone service through a federal program for the poor, the San Antonio mom thought it was too good to be true. She signed up anyway. (PRIVACY ON THE LINE: Get additional information on investigation - Mendez, 51, works the graveyard shift at a university gym, where she keeps the building clean and stocked with towels. She uses many of her cellphone's allotted 250 minutes each month to call the family's modest house in the evening while she's at work, checking on her husband and four young children. Did you do your homework? Mendez's phone also comes in handy during the day. "I'm always telling my husband, ‘where's my phone?'" "I need it because something's usually happening." For all the convenience afforded by Lifeline, the federal program that subsidizes phone service for qualified low-income households, Mendez now says her initial doubts were justified. back to September were posted to the Internet, Scripps found.

New App Lets You Boycott Koch Brothers, Monsanto And More By Scanning Your Shopping Cart In her keynote speech at last year’s annual Netroots Nation gathering, Darcy Burner pitched a seemingly simple idea to the thousands of bloggers and web developers in the audience. The former Microsoft MSFT +0.13% programmer and congressional candidate proposed a smartphone app allowing shoppers to swipe barcodes to check whether conservative billionaire industrialists Charles and David Koch were behind a product on the shelves. Burner figured the average supermarket shopper had no idea that buying Brawny paper towels, Angel Soft toilet paper or Dixie cups meant contributing cash to Koch Industries Koch Industries through its subsidiary Georgia-Pacific. Similarly, purchasing a pair of yoga pants containing Lycra or a Stainmaster carpet meant indirectly handing the Kochs your money (Koch Industries bought Invista, one of the world’s largest fiber and textiles companies, in 2004 from DuPont). At the time, Burner created a mock interface for her app, but that’s as far as she got.