Ana Perez
May 10, 2017 CST 373 The Problem With The Internet of Things Today many companies are trying to create the next new device that will improve or enhance the life of humans. The future will consist of your fridge reminding you as you walk out your house door to purchase a new gallon of milk because you’re about to run out. Your dentist telling you to brush spots you’ve missed when brushing your teeth because your toothbrush has been sending data over to him while you brush. You won’t forget about your laundry anymore because your laundry and dryer machines will text you once it is done. All these new devices are real things people want. This is the world of internet of things, and while this may benefit a lot of people in many ways, there is a huge problem that they must be aware of, and that is the security of their internet connected device. By the year of 2020 it is predicted that about 50 billion devices will be connected to the internet ( Tillman, CISCO). This means that more data will be transferred via the internet every single day, which creates more entry points for hackers to hack and steal your information. Sadly, not a lot is being done to fix this problem. Many companies are creating what is known as a minimum viable product (MVP) and are selling it out to the public just like that. Many of these companies don’t take security into account and this is the problem. There is a numerous amount of devices that are constantly being hacked into and people don’t even know about it. The problem with this is that currently there is nothing being done to make the best ethical decisions when it comes to securing the internet of things. In this paper we will discuss the current flaws with the internet of things and provide two possible solutions that developers and manufacturers can start applying to their product to begin creating a safe IoT world. Before we go further into analyzing the the security flaws with the world of Internet of Things. Let’s first describe what it is. According to Andrew Meola in the article titled “What Is The Internet of Things (IoT)?”, the Internet of Things is “a network of internet-connected objects able to collect and exchange data using embedded sensors.” A thing or device in the internet of things is a“Any stand-alone internet-connected device that can be monitored and/or controlled from a remote location.” Some examples are: automated light, water, and AC/Heating systems. All of these devices can be controller with applications via a dashboard. These remotes could be your smartphone, smartwatch, connected TVs, or nontraditional remotes. All of this data is stored in a database that is typically maintained by the company. This data is also usually displayed on your dashboard to help you make better predictions and decisions about whatever it is monitoring. These devices are meant to make your life easier and better, which is a good thing. Nevertheless, there has been a lot of devices ranging from baby monitors, smart locks, lights, thermostats, refrigerators, solar panel arrays, and even a wheelchair that have been easily hacked into. Lack of security in IoT devices is what makes all these hacks possible. In a recent article, “Cyber Spies Could Target Your Child Through A Baby Monitor” it is stated that a couple’s baby was scared to sleep in his room because he was afraid of the talking man from the monitor. The parents weren’t really sure of what was going on until they heard these words come out from the baby monitor: “Wake up little boy, daddy’s looking for you.” These disturbing words came from a man who was able to hack into the baby monitor because of it’s weak authentication system. In a research study conducted by by a security firm, Rapid7. Researchers studied nine different baby monitors and found that they all had little to no security implemented in their systems. Many of these devices were easy to hack into because of the weak authentication systems they have, as well as no secure data implementations. For example the Philips In.Sight B120 baby monitor “establishes a direct connection to the camera’s backend web application onto the public internet, unencrypted and unauthenticated” (Goodin). This means that any hacker is able to locate an exposed camera and watch the live stream as well as enable remote access or change camera settings by simply brute forcing the hostname and port number. Another baby monitor known as the Summer Infant Baby Zoom has a flaw in which their web service has an issue where “the method of adding an authorized viewer to the camera does not require any password of secret key for access to the feed” (Goodin). This means an attacker can access every camera by a user identifier on a URL and add any email address of their choice to every single camera and stream any camera whenever they want. Baby monitors are supposed to help keep a baby safe at all times, and that is not simply the case anymore. Parents trust the product that these companies are producing and yet they seem not to really care about it. Out of the nine different baby monitor companies that Rapid7 contacted only one of them responded, Philip, and they said they would be working on a patch for the product. The others simply did not care and are continuing to sell the product in the market. Moreover other other devices that you never thought it would be a thing for hackers to hack is “smart lightbulbs.” Currently there is a huge security flaw in the IoT device known as the Phillips Hue Light Bulbs. These smart lightbulbs have been previously hacked before and although Phillips keeps patching these problems new ones keep being easily found. In a recent article titled “Watch a drone hack a room full of smart lightbulbs from outside the window” author Ricker tells us that Researchers from the Weizmann Institute of Science and Dalhousie University were able to execute a chain-reaction attack to a building with smart lighting provided by the Philips smart lightbulbs. They exploited a vulnerability found in the ZigBee wireless communications protocol which allowed them to spread a virus to the lightbulbs using an autonomous attack kit. The idea of hacking someone’s lights seems very ridiculous and not likely but it has been done before to homes and now company buildings. All that is needed is cheap equipment and the motivation to do it. Now that I’ve mentioned some of the problems that the Internet of Things has and how their providers don’t really seem to care much about fixing the problem. It is obvious that something must be done to fix this. I’ve come up with two possible solutions that can help solve the problem with security in the devices of internet of things. The first proposal is that there needs to be clear transparency between manufacturers, developers, and their supply chain. This means that developers who create software for the devices need to know the vulnerabilities of their device, as well as the vulnerabilities of the hardware they are using, and of their third party vendors. If we take a Utilitarian Approach to this problem we would only be bringing the greatest good and the least harm to consumers (A Framework for...). When creating devices that are supposed to enhance our lives for the better, it is only ethical to think about all the possible ways these devices could be hacked and develop the most safe one. Developers and manufactures rely on low-cost outside resources as well as easily accessible software and hardware solutions to develop their devices. They depend on open source libraries and cheap hardware that they don’t know much about their security. This makes it hard to develop a well end-to-end system for the device. It could be that the software the company built is secure but the hardware that it is using has a breach that allows the software to be hackable and vise versa. If companies start being more transparent with one another they can help reduce the amount of hacks that can and have been happening with IoT devices. One suggested practice by the Department of Homeland Security is that: Conduct end-to-end risk assessments that account for both internal and third party vendor risks, where possible. Developers and manufacturers should include vendors and suppliers in the risk assessment process, which will create transparency and enable them to gain awareness of potential third-party vulnerabilities and promote trust and transparency. Security should be readdressed on an ongoing basis as the component in the supply chain is replaced, removed or upgraded. Trying to find potential breaches in all tools that manufacturers and developers are using and sharing with each other possible problems their software/hardware is the best ethical approach for the majority of the people. Finding these potential breaches only prevents future problems and people’s privacy is less likely to get invaded, therefore; this approach brings the greater good to the majority of consumers. The second approach is based on the Rights Approach: “Act in such a way that you treat humanity, whether in your own person or in the person of another, always at the same time as an end and never simply as a means to an end.” Currently companies just develop products for the sake of selling devices. There are many flaws with the world of IoT. Companies who are producing these products are taking what is known as the Egoist Approach, which brings the greatest amount of good for him or herself, in this case it is profit, (A Framework for...). The examples discussed earlier regarding the baby monitors and companies not responding to the email sent out by Rapid7 to tell them about the issues with their software, shows people how little it is that these companies care for about the security of their software. Not to mention, in a conference known as DEF CON, two security experts hacked into 12 out of 16 “Smart Locks” to prove how weak and broken the internet of things is. Interestingly enough "only one of the 12 vendors the two contacted to inform them of these flaws responded — and even then, there was no plan to fix anything.” (Coldewey). Is it really ethical for companies to not care about securing their devices? To not provide update for their software with patches to these security flaws? I don’t think that it should be that way. That is why implementing some security regulations or policies could be a benefit for IoT consumers. These regulations would ensure that developers think of security as they are designing their product, and promote security updates and vulnerability management. From an ethical standpoint, this is a good option because as mentioned earlier this benefits the majority of society as a whole because less people will be exposed to such vulnerabilities. Of course, even the most secure devices can be hackable, but when we start thinking about security from the start, when we are designing a product, then we are already taking actions to minimize the number of attacks that can happen in our nation. The Department of Homeland Security deeply cares about the security of the IoT, they believe that: Security should be evaluated as an integral component of any network-connected device. While there are exceptions, in too many cases economic drivers or lack of awareness of the risks cause businesses to push devices to market with little regard for their security. Building security in at the design phase reduces potential disruptions and avoids the much more difficult and expensive endeavor of attempting to add security to products after they have been developed and deployed. Instead of releasing products out to the market, IoT companies should make sure that their device has at least the necessary security implementations so that the devices are not easily hacked. They shouldn’t sell out products that have little to no security implemented because this only hurts them in the long run. Selling cheap unsecure devices may get them a good amount of profit because of the cheap prices, but in the long run, when people learn about the flaws of the system, they might start gaining bad reputation. In conclusion I think that as the world of Internet of Things keeps increasing because of the type of devices that could be meaningful for society. There needs to be a better way to handle and help secure the privacy of the consumers. That is why I believe that the best approach to take is a combination of the two. Companies should not use people as a means to an end simply to gain more profit. They should instead look at the ethical side of things and treat others as they would like to be treated. Companies should provide software that is secure and less likely to be hacked, they should start implementing security from the start, and be transparent with their hardware, software, and third party resources about the security flaws their resource may have. This way, manufacturers can build a device that is well secured all around. Works Cited "A Framework for Making Ethical Decisions | Science and Technology Studies." Brown University. N.p., n.d. Web. 20 May 2017. Coldewey, Devin. "‘Smart’ locks yield to simple hacker tricks." TechCrunch. TechCrunch, 08 Aug. 2016. Web. 20 May 2017. Dan Goodin - Sep 2, 2015 4:38 pm UTC. "9 baby monitors wide open to hacks that expose users’ most private moments." Ars Technica. N.p., 02 Sept. 2015. Web. 20 May 2017. Meola, Andrew. "What is the Internet of Things (IoT)?" Business Insider. Business Insider, 19 Dec. 2016. Web. 20 May 2017. Lawson, Stephen. "Companies say IoT matters but don't agree how to secure it." CSO Online. IDG News Service, 26 Sept. 2016. Web. 20 May 2017. Ricker, Thomas. "Watch a drone hack a room full of smart lightbulbs from outside the window." The Verge. The Verge, 03 Nov. 2016. Web. 20 May 2017. "Securing the Internet of Things." Securing the Internet of Things | Homeland Security. N.p., n.d. Web. 20 May 2017. "Seen At 11: Cyber Spies Could Target Your Child Through A Baby Monitor." CBS New York. N.p., n.d. Web. 20 May 2017. Tillman, Karen. "How Many Internet Connections are in the World? Right. Now." Blogs@Cisco - Cisco Blogs. N.p., 23 July 2013. Web. 20 May 2017.
1 Comment
I’m not sure if many of you guys are familiar with the show Black Mirror it’s a series in Netflix that explores techno-paranoia. One of the Episodes called San Junipero talks about how us as humans can choose what happens to us when we die. The episode focuses on two women who live in an artificial city called San Junipero. One of them is dead in real life but is able to visit her lover via high tech that transports her mind to another world and hangs out with her girlfriend, who in real life is already dead. In the end, when the women who is alive is about to die, she gets to choose whether or not she wants to be put in an artificial world in which she can stay young forever. However she is not able to leave the city, she will stay there for the rest of her life. She chooses to be left in San Junipero with the love of her life.
This Netflix series is kind of creepy in way. Image knowing that there is an afterlife where you can have it all and be happy and stay young forever at a young age. And you get to choose whether or not you want to be put in this artificial world after you die. What would you choose? If something like this is possible in the future, do you think it is ethically correct? Should we as humans try to create artificial worlds where we can allow humans to live forever or if we should just die and be buried with no choice, because after all that is nature. I personally think that I wouldn’t want to be put in another world where I cannot go and explore other cities. I think I’d get bored of being 21 forever. But at the same time I don’t know if it’d be a cool experience because I haven’t gotten the opportunity to explore it. Either way I think that we should just live for as long as life chooses us to live. I’ve said it before, Amazon just keeps coming up with things! I got to admit it though, this one is pretty cool. The Amazon Echo Show is like all the previous echo products plus a few extra features. In a recent article published by TechCrunch, titled Amazon unveils the $230 Echo Show, with a screen for calls, shipping June 28, author Ingrid Lunden, it is shown that with this product you can basically do tons of things hands-free. You can ask Alexa to order stuff from Amazon, play music from Amazon Music, Spotify, Pandora, and even iHeartRadio, play youtube videos, call, facetime, and message. You can also integrate other smart devices such as nursery cameras and control them from the device as well. There are many other cool things you can do with just voice commands and it’s all hands free. The price of this product speaks for itself $230, it’s almost like a cell phone, not price wise, but functionality wise except this only works over wifi and it’s quite bulky and big.
One of the things I like about the products that Amazon produces is that they aren’t very easy to hack into. It’s not a thing you often hear about when it comes to their echo devices. However it is still a possibility, and people should keep that in mind. Amazon deeply cares about the security and privacy of its users as I have mentioned in other blog posts but that doesn’t mean we should fully trust these devices. We should use them with precaution and be aware of the possibilities that could happen. I personally think that this device can be very handy to most people unlike the Amazon Echo Look, which I have previously talked about as well in blog post 11, which is basically an echo with a camera to take free hand selfies and videos of your outfits and get outfit recommendations. The Amazon Echo Show can facilitate people’s lives because of it’s free-hands functionality. You can answer calls while in the middle of cooking, you can order stuff online without having to stop what you are already doing. You can also watch a youtube tutorial if you need help while you are in the middle of learning something. You can ask Alexa to show you anything online without you having to pop up your laptop, or turn on the TV. And if you really want to watch TV you can ask Alexa to turn it on! The possibilities seem endless! One of the drawbacks of this device is that it seems as if you may have to move the Amazon Echo Show around with you in your house so that it is easy to reach and use. Unless you can afford to have multiple of these devices around your house, then there are no problems. Overall I think this device can benefit a lot of people. It is said that by 2020 about 50 billion devices will be connected to the internet and the average person will own about 8 of these devices. The more devices that you own the more apps you will need on your phone so that you can configure the settings, check status or data. That can be time consuming and tedious! Carnegie Mellon University is currently developing a system that allows devices to be identified and open its corresponding app by you simply tapping the device with your smartphone, you heard that right! Author Natasha Lomas tells us in her recent article, How a tap could tame the smart home, published by TechCrunch that the system, Deus EM-Machina, could be the most efficient way for people to manage all of their IoT applications.
So How exactly does this magic work? According to the research that engineering's are performing, the current system takes advantage of the electromagnetic noise emitted from electrical objects to power a device classifier. They are currently using a smartphone with an EM-sensor that can detect what type of IoT device the phone is resting on. This enables contextual functionality to be pushed to the screen of the smartphone so that it can be a dynamic control device. As the researchers at CMU have suggested, there is no reason for such system to get integrated into actual smartphones in the future. You won’t need to have an application installed in order to perform such things, it’ll be a thing that you can simply do with no problem. While this system is still in development it is something that will be very beneficial to everyone in the future. Currently it allows people to configure the settings of IoT devices you have it connected with, you can also transfer a document from your phone to your computer by simply tapping your phone against your laptop’s monitor. You can even copy text from a document in your phone and add it to your computer’s clipboard, which will allow you to paste it anywhere you’d like once on your computer! You can also control the color of your Smart LED light bulb, as well as print documents in your phone on a printer by simply tapping the against the printer! There are so many things you can do with the existing system, but researchers have still yet to finish building their API, in which more functionalities will be implemented. The world of internet of things just keeps growing and growing, but it’s security is not improving. In this article published by TechCrunch, ‘Smart’ locks yield to simple hacker tricks talks about how smart door locks can easily be hacked! During the DEF CON conference Anthony Rose and Ben Ramsey from Merculite Security showed the audience how easy it was to hack into “smart” security door locks. Out of 16 locks, they were able to open 12 of them. Many of these locks such as Quicklock, iBluLock, and Plantraco transmitted their passwords in plaintext, making them vulnerable to anyone with a Bluetooth sniffer. Some of the most “secure” ones that they weren’t able to hack into, were easily opened with a screwdriver which is basically the same thing! Also, only 1 out of the 12 companies they contacted about the locks responded and they still had no plans on fixing the problem. This is something I have previously discuss in other posts. Many companies don’t care about the security of their devices. They just it as a means to an ends, all they really care about is money. But the security and privacy of these people isn’t even on their mind.
The world of Internet of Things just keeps growing so fast, there has been tons of predictions about how many devices will be connected to the internet by 2020. However a lot of companies don’t take any precautions to make these devices secure. I don’t think anyone would want their house being broken into, or get anything stolen simply because their “smart” door locks aren’t secure enough. When creating such technologies, I think that people or companies should create things based on the rights approach, that is “Act in such a way that you treat humanity, whether in your own person or in the person of another, always at the same time as an end and never simply as a means to an end.” Companies shouldn’t create devices just to get money out of it. If their ultimate goal is to improve or benefit someone’s life, then they should be considerate about the security they are providing their customers with the devices they are creating. I’m sure they wouldn’t want to own devices that are not secure for their home or their life in general. Tons of IoT devices are so easy to hack into, toys, security cameras, baby monitors, and even house lights. People are at risk here and they pay money for these devices that are supposed to protect their homes, make their lives better, but in fact companies are just putting them in possible danger because they don’t take the right precautions. After reading Amazon’s new Echo Look has a built-in camera for style selfies I am not surprised by the things Amazon is coming up with. The Amazon Echo Look is an updated version of the Amazon Echo, it’s main purpose is to allow users to take hand-free selfies and videos of the outfits they are wearing that morning. Moreover it comes with an application that allows you to store all your outfits images for you to know your best outfits. The application also uses machine learning and advice from “fashion experts” to predict what type of style you’re into and to suggest to you new outfits that you should consider buying.
The recent technologies that Amazon has developed seem to me that they are only developed as a means to an end. These outfits suggestions are a way for users to start using the new Amazon Fashion store. When you take a picture and it is stored in the application, you can select up to two photos and based on those two images it will analyze which one looks best on you and it will also suggest other outfits that you can buy on the Amazon Fashion store. While taking selfies of your entire outfit might to share on social media might be something “cool”, it is also Amazon’s way to feed off of your wallet. Anyways, I personally think the Amazon Echo Look is not that amazing. We already have Pinterest to obtain outfit ideas, we already have timers on cameras to take pics hands free. I don’t really see something new created with this technology besides another way to create more consumerism. After reading this article published by the dailypot titled, “Privacy groups warn these 2 toys pose security risks for your kids” written by Fidel Martinez talks about how children toys are at risk of being hacked because they are connected to the internet. More specifically, it talks about two different types of toys: the my friend Cayla doll and the I-Que Intelligent Robot made by Genesis, a toy company. These two toys can be connected via bluetooth to another phone and can be used to talk to the children playing with the doll or robot. It is very easy to connect to it, and what is creepy about it is that whoever hacks into the toy can have a conversation with your child without you knowing. Moreover, this article talks about toys like this being direct violation of the Children’s Online Privacy Protection Act (COPPA), a law which specifically outlines how and what data companies can collect from children. Moreover, Genesis sends the recording between the doll and robot to a company named Nuance Communication, which is a speech recognition company in Massachusetts, that made the third party app for the toys, for marketing purposes. Moreover their terms of agreement is really long and it changes very often and they don’t inform the users of how their data is going to be affected.
I personally think that is very creepy for people to call children via toys and all because the security system of the toy is weak. Companies are not doing anything to protect the privacy and safety of children. Think about all the risks that your children could be exposed to just because the software that toys contain inside them is not secure. Moreover having kids recordings be sent to marketing companies so that they could be analyzed and then lated throw advertisements at them without them knowing is also daunting. Kids don’t know anything about advertising and how it works and it honestly seems like Genesis is just using them. It’s not morally correct to use children’s data like that. Parents should be more aware of the type of risks new toys like these have because they never know what sort of things their children are being exposed to. It’s not news to us that many companies use our search queries online to show us related ads later on in the day. I actually talked briefly about this in my previous blog post, if you’d like to check it out. In a recent article, Taylor Hatmaker tells us that Congress just voted to let internet providers sell your browsing history. Internet providers such as AT&T will now be able to sell your browsing history to advertisers in which they will be able to track, record, and analyze the type of things you are searching for online and the types of websites you go on so that they can later show you tons of advertisements to related items.
Internet Service Providers must first obtain their customers consent before selling the data, but they still can do it anyway. Moreover Internet Service Providers can offer their customers some type of “financial incentive in exchange for the internet’s right to use a customer’s confidential information” this means that if Internet Providers really want to access your browsing history they can offer you some type of deal even if you had said no in the beginning, maybe this way they can get you to change your mind. This may sound like a good deal to those who say no, but just image how much more money ISP would actually be getting just for your browsing history, a lot more than they are willing to offer you. To big companies like AT&T, Verizon, Charter, and Sprint, this is a big money maker opportunity. However, smaller internet service providers like: Cruzio Internet, Etheric Networks, and Sonic, disagree with this new law because they believe that customers should have a right to privacy and it should not be disclosed to others at all in any way. A lot of these big internet providers are already disclosing users information in very intrusive ways, which i’ll discuss in a later blog post. However many of them state that very clearly in their terms of agreement. The only one that makes it pretty clear is Verizon in which they stated in their terms of privacy that, “If you do not want information collected for marketing purposes from services such as the Verizon Wireless Mobile Internet services, you should not use those particular services.” So with the new law currently in process, it won’t be news if ISP are still using your browsing history even without your consent. For those who care about their privacy one solution to this would be using a VPN, but who knows if VPN providers will also start selling the browsing history. Another solution would be to set up your own VPN, and there are tons of resources online to help you do that. However there are many people who are not aware of VPNs. Moreover, there are a lot of communities that don’t have a variety of ISP options, for example myself. I live in King City, and the only internet provider that reaches the town is AT&T, so I can’t opt out of their services and switch to another internet provider that won’t sell my browsing history. Privacy to me is very important, and I am sure it is important to many other people as well. I don’t want my data to be shared with other companies for advertisement purposes, and moreover allow people make a profit out of it. Today many companies purchase or track your data from mobile apps such as social media, and websites we commonly use. It is of no surprise to anyone that if you find yourself doing a google search on Nikes, you will later see a Nikes related ad in your social medias. This has happened to me several times before but I disregard it, because it doesn’t influence me to buy the product anyway. The point here is that many companies are tracking you 24/7 and are using your data in anyway they can. In the article, Welcome to the Internet of Things. Please check your privacy at the door written by C.A. Burnett, the author informs us about the risks of data collection via the internet of things devices. Burnett covers different ways one’s security is exposed because of devices connected to the internet of things. The one that stuck out to me the most is about how users data will be sold and distributed amongst other companies. With the rise of Internet of Things, devices that are supposed to better your lifestyle will soon be the ones tracking and collecting the data they obtain from the device you own so that they sell it to bigger corporations for marketing.
While devices like the Fitbit, smartwatches, temperature thermometers, etc. can help us stay in shape, be on time, and stay warm all the time; the data they collect can also be used by the companies to sell it to other corporations and make more money out of it. Imagine your Fitbit collecting the amount of miles you’ve ran, your current weight, etc. and then later seeing ads on your social media or websites ads suggesting you to buy the latest pair of Nike trainers, or a workout outfit on your size. What’s happening now with companies tracking our mobile and computer devices, is going to happen with IoT. Our everyday data will be shared across multiple companies who will try to sell you another product, or try to charge you more than they already do. Tracking and data collection is just another way we are exposing our privacy via Internet of Things. It’s not only hackers, and our data being used in lawsuits like I’ve previously discussed in other blog posts, but it’s also marketing. I personally wouldn’t want my Fitbit data to be shared with other companies and then later see ads suggesting me to hire a trainer or something like that. Because of these reasons and more, people need to become aware of all the breach holes that devices in the internet of things world has. Face recognition is one of the latest technology that is advancing like crazy! Seriously, everyone is trying to use it in some way and while it can be fun like on Snapchat, there are some companies that want to use your face to do almost everything you do on a regular day basis. For example, while reading “Paying with Your Face, Face-detecting systems in China now authorize payments, provide access to facilities, and track down criminals. Will other countries follow?” written by Will Knight, will described using your face to pay at stores! Will talks about how face recognition use is increasing a lot in china. More specifically there are a lot of technologies and companies trying to incorporate face recognition into stuff like security, identifying registered drivers in public transportation, and even using your face as a new ID card.
Will talks about his experience during a visit to a startup company called Face++ (Face plus plus) a startup company that is trying to take facebook recognition to another level. As soon as he walked in, he saw his face being displayed in screens all around the offices. He said it was pretty cool how it all worked and that he didn’t even have to show his ID to be granted access to enter. Moreover, he did say that it felt creepy because he was kind of giving his privacy away. Having his face being stored in a database forever felt like he was giving a part of him away. I personally would feel the same way, having my face be stored in different databases honestly feels like I’d be giving my identity away. I am personally not a big fan of these types of technologies, because of that. Moreover, Face++ is working on technology that allows people to use their face as a new type of ID Card. You’ll no longer have to carry your ID wherever it is that you want to go. Face++ software automatically detects your face against those stored in the database. There are security issues that have been brought up because of this such as using a photo in front of a camera to bypass the face recognition, but Face++ software can determine if you are using a photo or an actual face. In order for the software to work properly one must be moving their face and talk so that it knows it is a real person who is trying to use the system for authentication. Overall I honestly feel that there are a lot more security breaches within face recognition software. With science advancing I don’t see how people won’t be able to replicate faces and them move them so that they are able to bypass the system. It may be cool to get rid of a paper ID card, but it can also be terrifying. Technology like the ones from Face++ need to find a way to make their systems more secure and trustworthy. |
AuthorAna Perez. Software Engineering Archives
May 2017
Categories |