Forget You Ever Tagged Me – Facebook

Facebook is shutting down its decade-old facial recognition software, the company announced yesterday. As part of the change, the newly minted Meta will delete the facial scan data of more than 1 billion users from its social network.

The technology, introduced in December 2010, automatically recognizes the identity of people in photos and videos and suggests that users tag them. Before that, if you recall, we had to tag people in images ourselves or (if you can believe) leave a photo untagged altogether and suffer the consequences of fewer likes.

What’s changing:

  • Users’ faces will no longer be recognized in photos, videos, or Memories on Facebook. Tagging is still possible, but it will have to be done manually.
  • Users who have opted in to the technology will have their templates deleted.

In a blog post, Meta’s VP of Artificial Intelligence Jerome Pesenti cited a lack of clear regulation by the government and “concerns about the place of facial recognition technology in society” as the main reasons behind the company’s decision.

What concerns?

How much time do you have? What initially seemed like an innocuous feature to save you precious seconds while you dropped apple picking albums on the timeline has become a highly controversial technology seen by critics as a privacy nightmare. The ACLU calls facial recognition tech an unprecedented threat that “gives governments, companies, and individuals the power to spy on us wherever we go.”

There’s also the issue of algorithmic bias. An MIT study of facial analysis software showed an error rate of 0.8% in the identification of light-skinned men, but that jumps to 34.7% for dark-skinned women.

Zoom out: Despite heavy investments by tech giants, facial recognition has suffered some major setbacks. Last year, Amazon, Microsoft, and IBM announced they would stop selling facial recognition software to police departments, who have come under scrutiny for using the technology to identify protesters. And Baltimore, Portland, and New York City have begun regulating private and public sector use of biometric data like face scans.

Hot this week

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

The Hidden Costs of Security Compliance

Compliance frameworks often create security blind spots by prioritizing checkbox exercises over real threat mitigation, leading to breaches despite passing audits.

The Illusion of AI in Cybersecurity

AI security tools often create alert fatigue instead of protection, but focusing on human oversight and measured deployment can turn them into effective assets.

Topics

The Blind Spots in Your Vulnerability Management Program

Automated vulnerability scanning often creates dangerous blind spots by missing nuanced threats that require human analysis, leading to false confidence in security postures.

Multi Factor Authentication Myths That Put Your Data at Risk

Multi-factor authentication creates a false sense of security when implemented without understanding its vulnerabilities, particularly in global contexts where method choices matter more than checkbox compliance.

The Overlooked Flaws in Multi Factor Authentication

Multi factor authentication is often presented as a security panacea, but hidden flaws and implementation gaps can leave organizations vulnerable despite compliance checkboxes.

The Hidden Costs of Security Compliance

Compliance frameworks often create security blind spots by prioritizing checkbox exercises over real threat mitigation, leading to breaches despite passing audits.

The Illusion of AI in Cybersecurity

AI security tools often create alert fatigue instead of protection, but focusing on human oversight and measured deployment can turn them into effective assets.

The Overlooked Risk of Shadow IT

Shadow IT poses a greater risk than many external threats by bypassing security controls, and managing it effectively requires understanding employee needs rather than simply blocking unauthorized tools.

Why Cloud Misconfigurations Threaten Your Business

Cloud misconfigurations are the leading cause of data breaches, yet most organizations focus on advanced threats instead of fixing basic security hygiene in their cloud environments.

The Human Factor in Cybersecurity Breaches

Human error is the root cause of most cybersecurity breaches, and addressing it through training and awareness is more effective than relying solely on technical solutions.
spot_img

Related Articles

Popular Categories