Nowadays, “swipe your face” to pay when shopping, “swipe your face” to unlock when you use your mobile phone, “swipe your face” to open the door when you enter the community, and “swipe your face” to board the plane directly by plane...More and more things can be done through the face Recognition technology to solve. While “brushing face” is convenient for us, it also brings the risk of privacy leakage. After we "brush face", will the images and data be stored and will there be a risk of leakage?
Image source: Imageworm creative
Forgot your password or your ID? Well, facial recognition (FR) technology can help. Using just their faces, people can unlock their smartphones, make payments and take the subway. FR technology has also been used to catch criminals.
Forgot your account password? It doesn't matter, face recognition technology can help you. People can unlock their smartphones through facial recognition, make payments and ride the subway. Face recognition technology can also be used to catch criminals.
However, as the use of FR applications has become more widespread, the technology has aroused controversy over privacy and financial security risks.
However, as the use of FR applications has become more widespread, the technology has aroused controversy over privacy and financial security risks. Risk controversy.
A survey jointly released by Guangzhou-based Nanfang Metropolis Daily and the Personal Information Protection Task Force on Apps said that almost 65 percent of respondents think that FR technology is being abused.
by Guangzhou-based Nanfang Metropolis Daily and the Personal Information Protection Task Force on Apps said A joint survey showed that about 65% of respondents believe that facial recognition technology has been abused.
Even worse, more than 30 percent said they have actually experienced financial loss as well as invasion of privacy due to facial information leak and abuse.
Economic loss or privacy violations caused by abuse.
According to Xinhua, many applications do have loopholes that could lead to leaks in personal and facial information data.
According to Xinhua News Agency, many applications do have loopholes that can lead to personal and facial information data leakage.
Loopholes aren’t the only worry, though. On some online trading platforms, only 2 yuan is charged for thousands of photos of people’s faces, but such trade is neither authorizednor legal.
But loopholes are not the only worry. On some online trading platforms, you can buy thousands of face photos for only two yuan, but such transactions are not authorized and illegal.
In August, two suspects were arrested in Hangzhou, Zhejiang province, for allegedly stealing and reselling personal information.
In August this year, two suspects were arrested in Hangzhou, Zhejiang province on suspicion of stealing and reselling personal information.
This has prompted concerns about the security of personal bioinformation. “Physical characteristics, including facial features and fingerprints, are some of the most important identifiers for individuals. Unlike our ID, which can be modified (modified), our bioinformation stays permanent for life, "Zhang Xin, associate professor at the University of International Business and Economics, told CGTN.
This incident has aroused concern about the safety of personal biological information. "Human faces, fingerprints and other physiological characteristics are the most important identification for individuals. Accounts can be modified, but our biological information will accompany us for life," said Zhang Xin, associate professor at the University of International Business and Economics in an interview with China International Television. .
Therefore, there should be a legal framework that regulates the collection, use, storage and transmission of bioinformation, according to Zhang.
Therefore, Zhang Xin believes that a legal mechanism that regulates the collection, use, storage and transmission of biological information should be established.
Though China does not have specific regulations relating to FR technology, the China Cyber Security Law, which came into effect in 2017, states that personal information can only be collected when individuals are informed and agree to the aims and scope of the collection.
China currently does not have specific regulations on facial recognition technology, but the "Network Security Law of the People's Republic of China" that has been implemented since 2017 stipulates that when network operators collect personal information, they should clearly indicate the purpose and scope of the collection and use of information, and have been The collector agrees.
The Civil Code, which was adopted this year, also states that personal consent is required before the collection and processing of personal information. And users have theright to ask to withdraw their personal information, according to Zhu Wei, deputy director of the Communication Law Research Center at the China University of Political Science and Law.
The "Civil Code" passed this year also stipulates that it requires the consent of a natural person to collect Handling of personal information. Zhu Wei, deputy director of the Communication Law Research Center of China University of Political Science and Law, said that users have the right to request deletion of their personal information.
Tech companies have been optimizing their FR algorithm and the ways in which they collect data. According to CGTN, they are now addressing security risks with more advanced technology, like federated learning that can train the algorithm without directly accessing the data the company collects. This Reduces the possibility of leaks.
technology companies have been optimizing the facial recognition algorithm and the way to collect receipts. According to China International Television, these companies are now using more advanced technologies to deal with security risks, such as federated learning, which can train algorithms without directly obtaining data collected by companies, thereby reducing the possibility of information leakage.
The English part of this article is from the 811 issue of "Twenty-first Century Student English Newspaper, Senior Two"