[Netease smart news September 16 news] Recently, Apple introduced its latest series of mobile phones, caused a lot of sensation, but one of the features was immediately reviewed, that is, FaceID, this tool can be identified through facial recognition Personal information and unlock the phone.
Unsurprisingly, this immediately triggered serious public concerns about consumer privacy, because the impact of this feature will be far-reaching. Retailers have long hoped that they can use face recognition to monitor consumers (and this feature is still not legally binding), and Apple can use FaceID to track its store's consumer model and even develop or sell the data. In addition, another possibility that the public is worried about is that the probability of the police unlocking the mobile phone without permission will increase because it is only necessary to lift the mobile phone to the target's face.
However, more importantly, in the United States, FaceID will cause people to start fearing another form of government monitoring, that is, large-scale scanning to identify individuals based on facial features. Law enforcement agencies are rapidly increasing the use of facial recognition technology. One in two U.S. adults has registered a law enforcement facial recognition network, and at least one quarter of the police departments have the ability to conduct facial recognition searches.
But so far, consumers have not had a formal platform. Although Facebook has a powerful facial recognition system, it does not retain the operating system to control the cameras on our mobile phones, tablets and laptops every day. Apple’s new system has changed this. For the first time, a company will have a facial recognition system with millions of user profiles, and it has hardware devices that scan and recognize human faces throughout the world.
In theory, this may make Apple a new target for large-scale monitoring. The government can issue instructions to Apple asking Apple to scan iphones, ipads and Macs to search for specific targets based on FaceID, and then provide the government with the location of these targets based on GPS data received from the matching devices.
Apple has always had a good record of securing user privacy, but in the past decade, the U.S. government has increasingly adopted this large-scale scanning method. Previously in the information disclosed by Edward Snowden has shown the existence of the Upstream project, which is a project under Section 702 of the Foreign Intelligence Surveillance Act (FISA) (which will expire in a few months). In the Upstream project, the NSA will scan all Internet communications coming in and out of the United States, monitoring emails for the target, IP addresses, and what the agency calls "cybersignatures." Last year, Reuters disclosed that according to the government's order, Yahoo has developed custom software to scan hundreds of millions of e-mail accounts to obtain users who include monitoring targets and use public key digitally signed e-mail content.
This time, Apple may soon face the US government's order to control millions of facial information to control the cameras that can scan and identify target audiences. This will make Apple's new unlocking system a government. Killer application for large-scale monitoring.
So how should Apple and the public deal with this risk?
First of all, Apple should do everything possible to take measures to protect itself from the influence of overly broad government orders. The face fingerprint developed by FaceID should only be stored locally on the device and should be fully encrypted so that the company cannot access it remotely, even if it is legally obliged to secretly control the iPhone.
However, the dispute over the encryption issue between Apple and the FBI remains unresolved, making this solution unreliable. Therefore, Apple should also update its transparency report and publish data, including whether it has received an order for the delivery of face recognition data, or conduct a face recognition scan. If a troubled order related to FaceID is received in the future, then the so-called "Canary" as a warning signal.
[Source: WiredSecurity Compilation: Netease Smart Compile Platform Revisited: Zhang Kexi]
The wire harness simplifies the building of these larger components by integrating the wiring into a single unit, or several units, for [drop-in" installation. By binding the many wires, cables, and subassemblies into a harness, the OEM or installer only has one component to install. In addition, a wire harness allows the completed assembly to be better secured against the effects of abrasion and vibration, and by constricting the wires into a non-flexing bundle, usage of space is optimized.
Game Machine Wire Assembly, wire harness for gaming machine, electrical wire assembly, gaming wire harnesses
ETOP WIREHARNESS LIMITED , https://www.etopwireharness.com