One would have to wonder if this can be fooled with a life-sized photo or a reconstructed model of my head. There isn’t a lot of details on how the 3D facial recognition works.
This lock has an ethernet port, so how hard would it be to connect to it and send a signal telling the lock that the face has been recognized? The convenient USB port would also come in handy if one would want to bypass the lock, by using a custom made program to subvert the facial recognition.
If I’m a criminal, however, I’m not even going to bother with this lock. I’m just going to go break a window and climb into your house instead. I can also just kick the door down.
This device is more for show than practical application. Show it to your friends and business customers and impress them with your cool gadget, but don’t use it for any sort of real security.
Even though British police have been told to stop harassing photographers, they continue to do so. A young woman is the latest victim of this idiotic harassment. Her crime? She was too cocky. This is the video of the incident, which involved beating the photographer.
While we are constantly controlled by the cctv, we do not have right to take photos or videos. I was stopped because I was filming and after a bit I had about 10 cops to deal with me. Even if I was not violent at all, they pushed me face down upon the floor. While they were bringing me to the van, with really tight handcuffs, they twisted my arm to give me more pain.
This is a video created by Tom Eston from SocialMediaSecurity.com walking you through the new Facebook privacy settings. It is a supplement to the “Facebook Privacy & Security Guide” which is available for download on our website. In addition this video covers notifications, Facebook Ads and hiding your Friends list from public searches.
Question and answer session from Bruce Schneier’s security talk hosted by the Open Rights Group:
We live in a unique time in our technological history. The cameras are ubiquitous, but we can still see them. ID checks are everywhere, but we still know they’re going on. Computers inherently generate personal data, and everyone leaves an audit trail everywhere they go.
Bruce Schneier, internationally-renowned cryptographer, technologist and author, shares his vision of current and future technologies’ effects on privacy. Schneier rejects the traditional “security vs. privacy” dichotomy in favor of a more subtle and realistic one.
Data is the pollution problem of the information age and we need to start thinking about how to deal with it.