Don't rush to buy iPhone X to find out if your face data is dangerous

(Original title: For data security, don't rush to buy iPhone X first) Qian Tongxin Just as people were delighted with the iPhone X's face recognition function, US lawmakers pressured Apple to submit details about the privacy and security provisions of biological data. The above-mentioned lawmakers believe that Apple may use FaceID to collect face recognition data to benefit third-party industries and may sell it to some organizations or companies that monitor consumer data. Apple may also force consumers to accept certain terms and agree that those third-party agencies enter user data. This warning raises the issue of the safety of biometrics. When the iPhoneX was released, Phil Schiller, Apple’s vice president of marketing, said that the face recognition data of Apple will only be stored in the user's personal device and will not be sent to the cloud server operated by Apple. Despite this, in the eyes of people, Apple can not guarantee that it and third-party organizations will not remote control of these data or access to the user's equipment through some substantive means to obtain the user's available data. This is not the first time Apple has faced the challenge of privacy. In the 2015 terrorist attacks in San Bernardino, California, Apple was asked by the federal prosecutor to unlock an iPhone related to the incident. Eventually the FBI purchased special tools to enter the equipment, which intensified the conflict between the technology company and the judicial supervision department. The author learned from insiders that Apple's current FaceID is using Apple's own technology, and there is no information indicating that the technology uses third-party technology. In this context, Apple is unlikely to give users privacy information. To third parties, including government agencies such as the FBI. Shi Chi, co-founder of Silicon Valley company uSens, who provides 3D human-computer interaction solutions for AR and VR, told the author: “FaceID will become a massive user portal and has far-reaching significance from the perspective of data collection. Apple is taking it step by step. The communication between people and the machine is simplified, the interaction threshold is reduced, and finally no touch screen communication is achieved. The unlocking of FaceID is the beginning of a touchless screen.” The Animoji expression kit demonstrated by Apple at the conference can track people's facial expressions and integrate them into the faces of various animals. This more personalized approach to AR interaction will become a much larger data portal. Apple has teamed up with Snap to make masks based on people’s facial expressions modeled into filters. As human-computer interaction becomes more simplified and pure, people's biological characteristics will play a greater role. In the future, people will use their fingers less to touch the keyboard, and use fingerprints, facial features, retinas, irises, gait, veins, hand shapes, palm prints and other biometrics. Compared with traditional passwords, the user's biometric information cannot be lost, forgotten or shared. However, data security will also become a bigger hidden danger. Even Apple's fingerprint reader is not a solution once and for all. As long as the objects touched, fingerprints are easily printed on the surface of the object. There have been similar cases before. Someone used latex to copy the user's fingerprints. After several attempts, he eventually fooled Apple's TouchID. From fingerprint recognition to face recognition, biometric technology has taken a big step forward. Compared with fingerprint recognition, face recognition is more efficient and faster to unlock, completely subverting people's understanding of information security in the traditional sense - cumbersome passwords are becoming the past. In the stage of rapid development of biometrics technology, how to improve the security performance of mobile devices to protect people's privacy? In response, Kevin Curran, a senior member of the IEEE and a professor of network security at Ulster University, told the author: “For the data security of biometrics, priority should be given to applying the most advanced encryption technology, the Holistic Security solution. The user can arbitrarily select authentication methods that are combined into multimodal biometrics from a wide range of identification methods." He also proposed that biometrics technology is a process of accreditation through continuous collection of user behavior characteristics, such as the habit of holding the phone at an angle when typing. However, although these biometric technologies are effective in protecting user information security, they will increase the production cost of mobile devices. In a highly competitive market environment, vendors may not be willing to adopt these expensive technology solutions. For companies, profit is always the primary consideration. From this point of view, although users will be further educated through FaceID, biometrics technology will continue to be encouraged to use, but it will take a long time to finally reach the standardization process.

Posted on