Facial recognition app helps scientists identify rabies-vaccinated dogs

In regions where dogs often run loose, don’t wear tags and aren’t microchipped, it can be difficult for authorities to keep track of which ones have already been vaccinated against rabies. A new app could help, by identifying individual dogs via facial… Continue reading Facial recognition app helps scientists identify rabies-vaccinated dogs

Microneedle patches could soon be used to tattoo our pets

While it’s important for your dog or cat to have a form of ID in case they get lost, tags can fall off, and microchips can migrate out of place. Japanese scientists are developing an alternative, in the form of quick and painless tattoos.Continue Readi… Continue reading Microneedle patches could soon be used to tattoo our pets

Premium smart binoculars can identify thousands of birds and animals

You can paw through books or search online to try an identify the strange bird visiting your garden feeder, or tap into the power of the Merlin Bird ID app. Now sports optics manufacturer Swarovski Optik has cooked Merlin smarts into a pair of high-end… Continue reading Premium smart binoculars can identify thousands of birds and animals

Facial Recognition Systems in the US

A helpful summary of which US retail stores are using facial recognition, thinking about using it, or currently not planning on using it. (This, of course, can all change without notice.)

Three years ago, I wrote that campaigns to ban facial recognition are too narrow. The problem here is identification, correlation, and then discrimination. There’s no difference whether the identification technology is facial recognition, the MAC address of our phones, gait recognition, license plate recognition, or anything else. Facial recognition is just the easiest technology right now…

Continue reading Facial Recognition Systems in the US

Breaking Laptop Fingerprint Sensors

They’re not that good:

Security researchers Jesse D’Aguanno and Timo Teräs write that, with varying degrees of reverse-engineering and using some external hardware, they were able to fool the Goodix fingerprint sensor in a Dell Inspiron 15, the Synaptic sensor in a Lenovo ThinkPad T14, and the ELAN sensor in one of Microsoft’s own Surface Pro Type Covers. These are just three laptop models from the wide universe of PCs, but one of these three companies usually does make the fingerprint sensor in every laptop we’ve reviewed in the last few years. It’s likely that most Windows PCs with fingerprint readers will be vulnerable to similar exploits…

Continue reading Breaking Laptop Fingerprint Sensors

New forensic tech may nab criminals by the look of their shoes

Although most of our clothes fold and crease with our bodies as we move, our shoes maintain the same shape and appearance pretty much all the time. With that fact in mind, scientists are now developing a method of catching criminals via shoe ID.Continu… Continue reading New forensic tech may nab criminals by the look of their shoes

On Technologies for Automatic Facial Recognition

Interesting article on technologies that will automatically identify people:

With technology like that on Mr. Leyvand’s head, Facebook could prevent users from ever forgetting a colleague’s name, give a reminder at a cocktail party that an acquaintance had kids to ask about or help find someone at a crowded conference. However, six years later, the company now known as Meta has not released a version of that product and Mr. Leyvand has departed for Apple to work on its Vision Pro augmented reality glasses.

The technology is here. Maybe the implementation is still dorky, but that will change. The social implications will be enormous…

Continue reading On Technologies for Automatic Facial Recognition

The Inability to Simultaneously Verify Sentience, Location, and Identity

Really interesting “systematization of knowledge” paper:

“SoK: The Ghost Trilemma”

Abstract: Trolls, bots, and sybils distort online discourse and compromise the security of networked platforms. User identity is central to the vectors of attack and manipulation employed in these contexts. However it has long seemed that, try as it might, the security community has been unable to stem the rising tide of such problems. We posit the Ghost Trilemma, that there are three key properties of identity—sentience, location, and uniqueness—that cannot be simultaneously verified in a fully-decentralized setting. Many fully-decentralized systems—whether for communication or social coordination—grapple with this trilemma in some way, perhaps unknowingly. In this Systematization of Knowledge (SoK) paper, we examine the design space, use cases, problems with prior approaches, and possible paths forward. We sketch a proof of this trilemma and outline options for practical, incrementally deployable schemes to achieve an acceptable tradeoff of trust in centralized trust anchors, decentralized operation, and an ability to withstand a range of attacks, while protecting user privacy…

Continue reading The Inability to Simultaneously Verify Sentience, Location, and Identity