the University of Chicago’s
Sand Lab
Clearview AI
Facebook
Microsoft
Azure Face
Amazon
The New York Times
Hoan Ton-
companies’
work.”A
Fawkes
Guy Fawkes
Venmo
Trojan Horse
Ben Zhao
Shawn Shan
Emily Wenger
Jiayun Zhang
Huiying Li
Haitao Zheng
Ben Y. Zhao —
Ton
Chinese
No matching tags
No matching tags
YouTube
Face++
No matching tags
Essentially, running Fawkes on your photos is like adding an invisible mask to your selfies.Scientists call this process “cloaking” and it’s intended to corrupt the resource facial recognition systems need to function: databases of faces scraped from social media. But if the photos you share online have been run through Fawkes, say the researchers, then the face the algorithms know won’t actually be your own.According to the team from the University of Chicago, Fawkes is 100 percent successful against state-of-the-art facial recognition services from Microsoft (Azure Face), Amazon (Rekognition), and Face++ by Chinese tech giant Megvii.“What we are doing is using the cloaked photo in essence like a Trojan Horse, to corrupt unauthorized models to learn the wrong thing about what makes you look like you and not someone else,” Ben Zhao, a professor of computer science at the University of Chicago who helped create the Fawkes software, told The Verge. And if people release more cloaked photos in the future, he says, sooner or later the amount of cloaked images will outnumber the uncloaked ones.On the adoption front, however, the Fawkes team admits that for their software to make a real difference it has to be released more widely.
As said here by James Vincent