This phone uses AI to block you taking naked selfies

Ever sent a nude photo to a partner before? If so, you’re not the only one. Just under 50% of American adults have sent nude photos (or videos), according to one 2014 study, while a survey by Cosmo from the same year found that 89% of millennial women had taken naked photos. Now one Japanese phone company says: “No, maybe that’s not such a good idea.”

The e20 is a new budget Android phone from Japanese company Tone. It’s got a triple-camera setup, despite costing just $180 (19,800 yen), and a 6.26-inch display. But its most salient feature is Smartphone Protection. It’s AI-software within the camera app that blocks users from taking nude selfies. If you take a shot that the phone’s image-processing algorithm suspects is a nude, it’ll block that photo from being saved to your gallery.

The feature is aimed at protecting Japan’s youngsters from being taken advantage of and snapping photos they may one day regret. The e20 can also connect to another person’s phone so that it can alert a parent or guardian if their child attempted to take an inappropriate photo.

AI, with its ability to recognize the contents of a photo, is used by companies like Facebook and Google to stop the virulent spread of illegal content. But it’s also used for nefarious purposes, like creating nudes out of pictures of clothed women.

Hot this week

The Myth of Perfect Security

Perfect security is a myth, and focusing on resilience rather than prevention can better protect your organization from inevitable breaches.

Why Traditional Passwords Are Failing Us

Password fatigue from complex rules often causes more security breaches than weak passwords, requiring a shift toward user-friendly tools and behaviors.

Why Your Employees Are Your Best Security Defense

Empowering employees with security awareness training often provides better protection than stacking more technology, turning human factors from a weakness into your strongest defense.

Why Most Security Awareness Training Fails and What to Do About It

Security awareness training often fails because it focuses on knowledge rather than behavior, but shifting to a behavior-based approach can lead to better outcomes and fewer incidents.

The Myth of Multifactor Authentication Security

Multifactor authentication enhances security but is not foolproof, as it can be bypassed through social engineering and technical exploits. Understanding its limitations and adopting stronger methods is essential for effective protection.

Topics

The Myth of Perfect Security

Perfect security is a myth, and focusing on resilience rather than prevention can better protect your organization from inevitable breaches.

Why Traditional Passwords Are Failing Us

Password fatigue from complex rules often causes more security breaches than weak passwords, requiring a shift toward user-friendly tools and behaviors.

Why Your Employees Are Your Best Security Defense

Empowering employees with security awareness training often provides better protection than stacking more technology, turning human factors from a weakness into your strongest defense.

Why Most Security Awareness Training Fails and What to Do About It

Security awareness training often fails because it focuses on knowledge rather than behavior, but shifting to a behavior-based approach can lead to better outcomes and fewer incidents.

The Myth of Multifactor Authentication Security

Multifactor authentication enhances security but is not foolproof, as it can be bypassed through social engineering and technical exploits. Understanding its limitations and adopting stronger methods is essential for effective protection.

Why MFA Is Not Enough Anymore

Multi-factor authentication is no longer a silver bullet for security as attackers develop new bypass methods, requiring a layered defense approach with phishing-resistant tools and continuous monitoring.

Why Phishing Still Works and What to Do About It

Phishing remains a top threat because it exploits human psychology, not just technical gaps. Shifting focus to employee awareness and habits can build stronger defenses than relying solely on technology.

Rethinking Password Security

Complex password rules often increase risk by encouraging poor habits. Learn how password managers and multi-factor authentication offer more practical protection for organizations of all sizes.
spot_img

Related Articles

Popular Categories