Skip to main content

ProLinks Biometrics #44

ProLinks are back after a long silence thanks to new ideaton sessions we have started in our consulting team at Innovatrics. Here is what happened.

Consultant works more or less like a one man army - visiting customers and helping them solve whatever issue they have related to our products and projects. We therefore often get out of sync on what is happening with other projects, clients, competitors, tools or generic news.

So, I have promised that I will try to keep my team up to date with the latest news. And while I'm at it, lets keep up to date everyone who is interested.

Because at Innovatrics we focus on biometrics, for now most news will be focused on that. Of course, now and than we discover something that is really useful for anyone, so there will be also a section for stuff like that.

So from now on, every two weeks I will try to compile what I have found on the Internet about biometrics. That's enough for an explanations, lets jump in on the news.


ID Talk Podcast

We live in an era of podcasting and I don't know about you, but I love to consume information this way. That's why I'm  glad that FindBiometrics and Mobile ID World have started publishing interesting discussions with people from biometric industry.

You can find ID Talk on Soundcloud or use this RSS feed for your Podcast application.

Google Photos

Feature that allows you to group your photos by faces on them, which was available in some countries for a long time, is spreading. The claim, that everything is stored locally and fully in your ownership is really interesting.

Blacklisting Chinese facial recognition vendors

The US is cracking down on Chinese companies which provide facial recognition algorithms. This can shuffle the market, both due to sanctions and also due to possible removal of sanctioned algorithms from NIST FRVT benchmarks.

Facial recognition vendors in trouble

Most facial recognition vendors are in trouble anyway, as one of the most used free databases MegaFace contains images protected under strict BIPA regulation, which allows some US citizens to sue them, if they have used this dataset for algorithm development without their permission.

Datasets to grab

Mentioned in the article above is project Megapixels, which links several interesting datasets for grab. Be careful about the regulations though :).

Facial algorithms vulnerable to infrared lights

Researches have demonstrated that they can fool facial recognition algorithms using simple infrared lights. Interesting fact is, that this works both for avoiding face detection and also for impersonating somebody else.

Facial algorithms vulnerable to morphing

Helping visually impaired

While cameras used by police officers which allow them to identify everybody in real-time can be scary, the same principle can help visually impaired to recognize their friends and family.

California is killing passwords

New regulations in California called CCPA can help boost biometric industry. This is happening despite the war on facial recognition waged by the same state.

Three reasons to worry

NYT has published short op-ed about the possible issues with facial recognition, including racial biases and sending wrong people to jail. Valid points, though sometimes overblown.


Popular posts from this blog

ProLinks #65 - North Korea, Cryptocurrencies, Propaganda and more

Tech The Incredible Rise of North Korea’s Hacking Army He was right. As the newspapers soon reported, more than sixteen million dollars was withdrawn from roughly seventeen hundred 7-Eleven A.T.M.s across Japan that morning, using data stolen from South Africa’s Standard Bank. The newspapers surmised that 7-Elevens had been targeted because they were the only convenience stores in Japan whose cash terminals all accepted foreign cards. Soon after the raids, the withdrawal limit for many A.T.M.s in the country was reduced to fifty thousand yen Why Cryptocurrency Is A Giant Fraud ❧ Current Affairs Schweikert is partly right: “selling it as a revolution” is a hugely important part of why cryptocurrency is succeeding. But as is generally the case when someone is trying to sell you something, the whole thing should seem extremely fishy. In fact, much of the cryptocurrency pitch is worse than fishy. It’s downright fraudulent, promising people benefits that they will not get and trying

ProLinks Biometrics #51 - Clearview AI and the backlash

This edition brings good and bad news about controversial company Clearview AI. You can also find out about best practices working with biometrics or huge fines for Facebook and Google. Enjoy! Biometrics Identifying anybody thanks to social media This New York Time expose of a not that well known company shows how companies and governments can utilize public information to identify anybody using facial recognition. The companies from which the Clearview AI scrapped the data are fighting back though . Without some serious changes in possibilities to scrape web we are screwed anyway, as researchers have build their own version of Clearview in about two weeks . Source: Best practices for storing biometrics Jeffrey N. Rosenthal and David J. Oberly of Blank Rome LLP. have provided short summary of issues you may face if you want to be in business of storing and working with biometrics , make sure to check it out. BIPA in action Illinois Biometric

ProLinks #11

First ProLinks edition in 2018 brings a lot of links for IT professionals including solid Ruby criticism. Also interesting links about society, science and more inside. IT Managing Engineers with Ron Lichty The Problem Solver - Good developers are good problem solvers. They turn each task into a series of problems they have to solve. Energy Efficiency: A New Concern for Application Software Developers - The prevalence and ubiquity of mobile computing platforms, such as smartphones, tablets, smart watches, and smart glasses, have changed the way people use and interact with software. Clever ideas that failed -  The cleverness of an idea is proportionate to its odds of failure. SSH Security and You - /bin/false is *not* security - I thought to myself, "Fine, no shell for me. I wonder if port forwarding works?" The 100x Engineer - If we want to be 100x engineers — engineers who have 100x the impact of ye’ old 1x engineer—how do we accomplish tha

ProLinks Biometrics #49 - How biometrics is making spying hard

In this edition the highlight for me is an article from Yahoo news about the trouble spy agencies are in because of biometrics and surveillance (I love irony). Other than that, you can read about reducing friction or using biometrics to track police (again, I love irony). Enjoy! Biometrics How biometrics has changed spying Biometrics at borders control, using it to issue documents or checking at hotels is making work of spies using fake identities hard to impossible, depending on a state. For example, Singapore will alert security forces if somebody is taking too long to check into a hotel . Read the linked article to find out much more. Source: Reducing friction Nowadays is all about the user experience and friction or the lack of it. User do not like to make unnecessary actions to accomplish something . Reducing friction is mostly great, but there are also downsides, as overusing social networks. Making sure that policemen are working Pol

Are there types of programmers?

As a response to my previous post about why there is so many programming languages I got very interesting answer about types of programmers. Than I have read linked article about Mort, Elvis, Einstein, and You  and subsequently post The Two Types of Programmers  which lead me to The Fourteen Types of Programmers .  As you have probably realized, there are many different opinions on this topic. So what is the reality? Let me add to the pile of opinions. It always comes down to this - How do we set the criteria on which we want to categorize. Based on these criteria we can form clusters. These clusters of programmers are than our categories. You could probably do this with clustering algorithm if you can form reasonable dataset. So basically the question how many types of programmers are there  cannot be answered without specifying your criteria. And from this misunderstanding of how the question works comes discussions about how many categories there is. There