gradientsrneat an hour ago

Really glad there are researchers out there coming up with bad actor scenarios, and I hope corporations, privacy advocates, and the government take these into consideration.

These are solvable problems. Not always 100% but the harms can be mitigated. But the truth is that some people don't want these problems solved.

Another example in the wild was Apple Air Tags.

rahimnathwani an hour ago

I'm curious about how they do the reverse image search. Do they just use Google?

  • palmfacehn 37 minutes ago

    The article mentions that they used publicly available databases. Their paper specifically mentioned Pimeyes and Facecheck ID.