1
1
You Can Encrypt Your Face [electronic resource].
Title & Author:

You Can Encrypt Your Face [electronic resource].

Publication:

The New Inquiry 2017

Restrictions:

Open access content

Notes:
CC BY-NC-SA
Summary:

Facial recognition technology turns your face into code that can be archived and traded among strange and suspect parties. Its growing sophistication in the hands of law enforcement poses a particular threat to anonymous dissent. Civil rights groups are already forecasting a near future where police use of facial recognition to track protesters will discourage people from hitting the streets. The face is only one of several methods that companies specializing in biometric identification technology are developing at a rapid pace. Because they’re harder to forge than passwords, companies are scooping up our faces, gaits, irises and fingerprints in the name of identity verification and national security. With the global industry expected to balloon by several billions of dollars over the next five years, legislative attempts to hinder its growth are just barely catching up. But our right to anonymity cannot wait. Our visages have become sites of inert code, passively captured from our bodies by Facebook photographs and CCTV videos. Facial recognition companies often use encryption as a way of securing these raw goods—our faces—and winning favor with potential contractors. The Kansas-based company StoneLock, for example, boasts that it uses infrared imagery to reduce your facial measurements into a unique and encrypted biometric signature data file. Nobody could reconstruct your unique facial measurements, except the corporation that keeps your face in its lockbox. It’s time we conspire to shield our meatsacks from such intrusions and reclaim what encryption means in the context of biometric technology. You can, in fact, encrypt your face, and your bodies. The more people who do it, the better it works. Although putting a mask on in public on a regular basis is impractical, physically anonymizing yourself in public spaces should become commonsense for navigating contentious political events. The New Inquiry has come up with a novel approach to do this. We’ve devised an
https://www.librarystack.org/you-can-encrypt-your-face/?ref=unknown

Resources:
Item Resolution URL
Subject:

Algorithms
Artificial intelligence
Biometric identification
Electronic surveillance

Form/genre:

Text

Added entries:

The New Inquiry

Actions:
1
1

Sign up to get news from us

Email address
First name
Last name
By signing up you agree to receive our newsletter and communications about CCA activities. You can unsubscribe at any time. For more information, consult our privacy policy or contact us.

Thank you for signing up. You'll begin to receive emails from us shortly.

We’re not able to update your preferences at the moment. Please try again later.

You’ve already subscribed with this email address. If you’d like to subscribe with another, please try again.

This email was permanently deleted from our database. If you’d like to resubscribe with this email, please contact us

Please complete the form below to buy:
[Title of the book, authors]
ISBN: [ISBN of the book]
Price [Price of book]

First name
Last name
Address (line 1)
Address (line 2) (optional)
Postal code
City
Country
Province/state
Email address
Phone (day) (optional)
Notes

Thank you for placing an order. We will contact you shortly.

We’re not able to process your request at the moment. Please try again later.

Folder ()

Your folder is empty.

Email:
Subject:
Notes:
Please complete this form to make a request for consultation. A copy of this list will also be forwarded to you.

Your contact information
First name:
Last name:
Email:
Phone number:
Notes (optional):
We will contact you to set up an appointment. Please keep in mind that your consultation date will be based on the type of material you wish to study. To prepare your visit, we'll need:
  • — At least 2 weeks for primary sources (prints and drawings, photographs, archival documents, etc.)
  • — At least 48 hours for secondary sources (books, periodicals, vertical files, etc.)
...