mirror of
https://github.com/privacyguides/privacyguides.org.git
synced 2025-12-15 07:53:21 -05:00
Merge bb2512faa8 into 40f3814402
This commit is contained in:
commit
e214398a7f
3 changed files with 59 additions and 0 deletions
BIN
blog/assets/images/biometric-abuses/facescan.png
Normal file
BIN
blog/assets/images/biometric-abuses/facescan.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 223 KiB |
BIN
blog/assets/images/biometric-abuses/profile.png
Normal file
BIN
blog/assets/images/biometric-abuses/profile.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 117 KiB |
59
blog/posts/biometrics-abuses.md
Normal file
59
blog/posts/biometrics-abuses.md
Normal file
|
|
@ -0,0 +1,59 @@
|
|||
---
|
||||
date:
|
||||
created: 2025-09-02T17:30:00Z
|
||||
categories:
|
||||
- Explainers
|
||||
authors:
|
||||
- fria
|
||||
tags:
|
||||
- Biometrics
|
||||
license: BY-SA
|
||||
schema_type: BackgroundNewsArticle
|
||||
description: Biometrics are widely used for both malicious and legitimate reasons. How widespread is the abuse of biometric data, and is there anything you can do about it?
|
||||
preview:
|
||||
cover:
|
||||
---
|
||||
|
||||
# An Overview of Biometric Abuses
|
||||
|
||||
Almost everyone has dealt with biometric data at some point, whether it's for authentication on your phone, or taking a photo for your driver's license, any time you're using data derived from your body to be identified it's biometrics.
|
||||
|
||||
There's nothing inherently wrong with biometric authentication, in fact it's one of the pillars of secure [multi-factor authentication](https://csrc.nist.gov/glossary/term/Multi_Factor_Authentication): something you know, something you have, and **something you are**. Plenty of systems use biometrics in a private way. Your phone, for example, stores your biometric data safely inside its [secure element](https://support.apple.com/guide/security/biometric-security-sec067eb0c9e/1/web/1); it never leaves your device and can't easily be extracted. This is one of the most important aspects of **ethical biometrics**: the data should never be stored on a server somewhere or accessible to anyone, even you.<!-- more -->
|
||||
|
||||
But many biometric systems in place today aren't designed to preserve your privacy and simply exist to track you around. I touched on a few of these in a [previous article](https://www.privacyguides.org/articles/2025/02/13/biometrics-explained/) but I'd like to expand on just how pervasive the issue is.
|
||||
|
||||
## Surveillance Systems
|
||||
|
||||
Plenty of organizations want to be able to track you around for a multitude of reasons, from governments to grocery stores. Unfortunately, your human body has plenty of unique signatures that can identify you individually.
|
||||
|
||||
Since you can't change your body (without extensive surgical modification which would then quickly become your new permanent identifier anyway), measuring its characteristics is the perfect way to surveil you everywhere you go, from the grocery store to public spaces, anywhere could be hiding Big Brother-style surveillance apparatus.
|
||||
|
||||
### FTx Identity
|
||||
|
||||
First up on the wall of shame, [FTx](https://ftxidentity.com/industry/in-store-age-verification/). They promise to revolutionize "in-store age verification & customer tracking" using a network of cameras set up all over the store, allowing for constant monitoring and identification via facial recognition.
|
||||
|
||||
<figure>
|
||||
<img src="../assets/images/biometric-abuses/facescan.png" alt="Smiling woman with her arms crossed having her face scanned by a camera shooting a red laser grid at her face">
|
||||
<figcaption>"Help me"</figcaption>
|
||||
</figure>
|
||||
|
||||
You're then recorded under the permanent profile they keep for you that's displayed on the POS systens the employees see.
|
||||
|
||||

|
||||
|
||||
They say it "monitors movement from entry to exit with real-time visuals". It's a bit creepy to think there's a real-time updated map of where I am in the store at all times.
|
||||
|
||||
They also keep track of "customer history—previous purchases, preferences, and identity status". If you thought tracking profiles of your purchases and actions were exclusive to the web, you're wrong.
|
||||
|
||||
The tracking is stated to be used for marketing and anti-theft purposes. Since the system is AI-driven, hopefully it doesn't randomly decide you're a thief and sound the alarm on you.
|
||||
|
||||
They also market age verification so customers don't have to flash their ID for things like alcohol purchases, but I'd rather show my ID for two seconds than have this permanent tracking profile kept of me.
|
||||
|
||||
As for how the data is handled:
|
||||
|
||||
> All sensitive personal information (including ID images and biometric data) is encrypted during transmission and while stored on our servers. This means your data is encoded so that only authorized systems with the proper keys can read it. For example, when your ID scan is sent to our server, it travels over an encrypted connection (HTTPS/TLS), and once stored, the file is encrypted at rest.
|
||||
|
||||
So your data is not E2EE, they just use transport encryption and then separately encrypt it at rest, meaning they have access to any stored data and hackers have a nice juicy target to attack.
|
||||
|
||||
### Target
|
||||
|
||||
Loading…
Add table
Add a link
Reference in a new issue