{"id":26202,"date":"2019-03-18T14:48:13","date_gmt":"2019-03-18T14:48:13","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29943\/Facial-Recognition-101-Your-Face-Is-Your-New-Fingerprint.html"},"modified":"2019-03-18T14:48:13","modified_gmt":"2019-03-18T14:48:13","slug":"facial-recognition-101-your-face-is-your-new-fingerprint","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/","title":{"rendered":"Facial Recognition 101: Your Face Is Your New Fingerprint"},"content":{"rendered":"<p class=\"speakableTextP1\"><a href=\"https:\/\/www.cnet.com\/tags\/facial-recognition\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Facial recognition|CNET_TAG|525&quot;}\">Facial recognition<\/a> is a blossoming field of technology that is at once exciting and problematic. If you&#8217;ve ever unlocked your <a href=\"https:\/\/www.cnet.com\/reviews\/apple-iphone-xs-review\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Apple iPhone XS|CNET_FAM_SERIES|558&quot;}\">iPhone<\/a> <span section=\"inline-annotation|leads\">(<a href=\"https:\/\/assoc-redirect.amazon.com\/g\/r\/https:\/\/www.amazon.com\/dp\/B07HCZYW8Q\/ref=asc_df_B07HCZYW8Q5828246?tag=cnet-ce-20&amp;creative=395261&amp;creativeASIN=B07HCZYW8Q&amp;linkCode=asn&amp;ascsubtag=___VIEW_GUID___\" target=\"_blank\" rel=\"nofollow\" data-component=\"leadsTracker\" data-leads-tracker-options=\"{&quot;numNodes&quot;:3,&quot;trackingData&quot;:{&quot;asid&quot;:&quot;&quot;,&quot;assetguid&quot;:&quot;7b51355c-8dee-40af-8f27-9bc7adec3a63&quot;,&quot;contype&quot;:&quot;magnet_article&quot;,&quot;destUrl&quot;:&quot;https:\\\/\\\/assoc-redirect.amazon.com\\\/g\\\/r\\\/https:\\\/\\\/www.amazon.com\\\/dp\\\/B07HCZYW8Q\\\/ref=asc_df_B07HCZYW8Q5828246?tag=cnet-ce-20&amp;creative=395261&amp;creativeASIN=B07HCZYW8Q&amp;linkCode=asn&quot;,&quot;devicetype&quot;:&quot;desktop&quot;,&quot;leadcpc&quot;:&quot;&quot;,&quot;ltype&quot;:&quot;mlst&quot;,&quot;merid&quot;:300346,&quot;pagetype&quot;:&quot;article&quot;,&quot;pid&quot;:&quot;&quot;,&quot;rsid&quot;:&quot;cbsicnetglobalsite&quot;,&quot;siteid&quot;:&quot;1&quot;,&quot;topic&quot;:&quot;&quot;,&quot;ttag&quot;:&quot;amazon&quot;,&quot;viewguid&quot;:&quot;&quot;,&quot;assettitle&quot;:&quot;apple-iphone-xs-64gb-space-gray&quot;,&quot;campaign&quot;:&quot;amazon&quot;,&quot;ctype&quot;:&quot;cpc&quot;,&quot;cval&quot;:85,&quot;leadCpc&quot;:0.85,&quot;mfgid&quot;:272829,&quot;mfr&quot;:&quot;apple&quot;,&quot;ontid&quot;:&quot;&quot;,&quot;pdguid&quot;:&quot;f33aaf2b-7d4e-4be6-b996-3347e8d3fd39&quot;,&quot;productId&quot;:&quot;f33aaf2b-7d4e-4be6-b996-3347e8d3fd39&quot;,&quot;productName&quot;:&quot;apple iphone xs (64gb, space gray)&quot;,&quot;productSeriesId&quot;:&quot;c3b5f709-d4ef-4f57-b0d5-eefb4d78d6f0&quot;,&quot;seourl&quot;:&quot;https:\\\/\\\/www.cnet.com\\\/reviews\\\/apple-iphone-xs-review\\\/&quot;,&quot;sl&quot;:&quot;en&quot;,&quot;topicbrcrm&quot;:&quot;Mobile:Phones&quot;,&quot;topicguid&quot;:&quot;1c5a20d4-c387-11e2-8208-0291187b029a&quot;,&quot;leadProdPrice&quot;:1000}}\" class=\"inlineAnnotation norewrite nolinks\">$1,000 at Amazon<\/a>)<\/span> by looking at it, or asked <a href=\"https:\/\/www.cnet.com\/tags\/facebook\/\">Facebook<\/a> or <a href=\"https:\/\/www.cnet.com\/google\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Google|CNET_TAG|671&quot;}\">Google<\/a> to go through an unsorted album and show you pictures of your kids, you&#8217;ve seen facial recognition in action.<\/p>\n<p class=\"speakableTextP2\">Whether you want it to or not, facial recognition (sometimes called simply &#8220;face recognition&#8221;) is poised to play an ever-growing role in your life. Your face could be scanned at airports or concerts with or without your knowledge. You could be targeted by personalized ads thanks to cameras at shopping malls. Facial recognition has plenty of upside. The tech could help <a href=\"https:\/\/www.cnet.com\/smart-home\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Smart Home|CNET_CAT_TOPIC|2352&quot;}\">smart home<\/a> gadgets get smarter, sending you notifications based on who it sees and offering more convenient access to friends and family.&nbsp;<\/p>\n<p><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/XUYSVIv7gLm7BmKPqMNBXVUncDM=\/370x0\/2019\/03\/15\/78bebc15-c44a-4b23-9aaf-49fcc37c93b1\/facial-recognition-promo.jpg\" class alt=\"facial-recognition-promo\" height=\"0\" width=\"370\"><\/span><\/span><\/p>\n<p><span class=\"caption\">This is part of a CNET special report exploring the benefits and pitfalls of facial recognition.<\/span><\/p>\n<p><span class=\"credit\">James Martin\/CNET<\/span><\/p>\n<p>But at the very least, facial recognition raises questions of <a href=\"https:\/\/www.cnet.com\/tags\/privacy\/\">privacy<\/a>. Experts have concerns ranging from the overreach of law enforcement, to systems with hidden racial biases, to hackers gaining access to your secure information.<\/p>\n<p>Over the next few weeks, CNET will be diving into facial recognition with in-depth pieces on a wide variety of topics, including the science that allows it to work and the implications, both positive and negative, for many of its applications. To get you up to speed, here&#8217;s a brief overview including what facial recognition is, how it works, where you&#8217;ll find it in use today, as well as a few of the implications of this rapidly expanding corner of technology.<\/p>\n<h2>What is facial recognition?<\/h2>\n<p>Facial recognition is a form of biometric authentication, which uses body measurements to verify your identity. Facial recognition is a subset of biometrics that identifies people by measuring the unique shape and structure of their faces. Different systems use different techniques, but at its core, facial recognition uses the same principles as other biometric authentication techniques, such as fingerprint scanners and voice recognition.<\/p>\n<h2>How does facial recognition work?<\/h2>\n<div class=\"shortcode video v2\" data-video-playlist=\"[{&quot;id&quot;:&quot;820c3244-169a-4394-a6a6-da939e1a9394&quot;,&quot;title&quot;:&quot;Facial recognition: Get to know the tech that gets to know you&quot;,&quot;description&quot;:&quot;The emerging tech of facial recognition is both awesome and scary. We take a look at how it works, where you\\u0027ll find it and what it means.&quot;,&quot;slug&quot;:&quot;facial-recognition-get-to-know-the-tech-that-gets-to-know-you&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;datePublished&quot;:&quot;2019-03-18 12:00:01&quot;,&quot;duration&quot;:311,&quot;mpxRefId&quot;:&quot;Bu_GReDkXsXmxE81wYMuGn84iPC_QXmW&quot;,&quot;ratingVChip&quot;:&quot;TV-14&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;1bd51323-c387-11e2-8208-0291187b029a&quot;},&quot;author&quot;:{&quot;id&quot;:&quot;9e5e0c16-8305-40a2-9f81-14aa64db34eb&quot;,&quot;firstName&quot;:&quot;Andrew&quot;,&quot;lastName&quot;:&quot;Gebhart&quot;},&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;7e2e8c52-ecba-4a92-a5ea-f2f711e41bfc&quot;,&quot;title&quot;:&quot;Facial Recognition&quot;},&quot;image&quot;:{&quot;path&quot;:&quot;https:\\\/\\\/cnet4.cbsistatic.com\\\/img\\\/89Q7fa6CSnfqq94h8eOI1hOkTuU=\\\/1280x720\\\/2019\\\/03\\\/15\\\/24f83d38-b716-4dbb-909b-edbb73d85b1b\\\/facial-recogntion-1010.jpg&quot;},&quot;thumbnail&quot;:&quot;https:\\\/\\\/cnet3.cbsistatic.com\\\/img\\\/UsUcnbNCHR0OwYmDIbxUOhqCG6g=\\\/194x109\\\/2019\\\/03\\\/15\\\/24f83d38-b716-4dbb-909b-edbb73d85b1b\\\/facial-recogntion-1010.jpg&quot;,&quot;closedCaptionPath&quot;:&quot;\\\/videos\\\/captions\\\/dfxp\\\/facial-recognition-get-to-know-the-tech-that-gets-to-know-you.xml&quot;,&quot;urlPath&quot;:&quot;\\\/videos\\\/facial-recognition-get-to-know-the-tech-that-gets-to-know-you\\\/&quot;,&quot;isVertical&quot;:false,&quot;m3u8&quot;:&quot;\\\/videos\\\/manifest\\\/facial-recognition-get-to-know-the-tech-that-gets-to-know-you.m3u8&quot;,&quot;mp4&quot;:&quot;https:\\\/\\\/cnetmedia-a.akamaihd.net\\\/21923\\\/2019\\\/03\\\/15\\\/1459099715931\\\/Facial_Recogntion_101_cut_down_23406_740.mp4&quot;,&quot;index&quot;:0}]\" readability=\"6\">\n<div class=\"embeddedVideoContainer\" tabindex=\"0\" aria-label=\"Play video Facial recognition: Get to know the tech that gets to know you\" data-load-video=\"0\" data-video-id=\"820c3244-169a-4394-a6a6-da939e1a9394\" readability=\"7\">\n<div class=\"videoContainer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/UsUcnbNCHR0OwYmDIbxUOhqCG6g=\/194x109\/2019\/03\/15\/24f83d38-b716-4dbb-909b-edbb73d85b1b\/facial-recogntion-1010.jpg\" class=\"photo\" alt height=\"109\" width=\"194\"><\/div>\n<p><span class=\"bold\"><span class=\"nowPlaying\">Now playing:<\/span> <span class=\"watchThis\">Watch this:<\/span><\/span> Facial recognition: Get to know the tech that gets to&#8230;<\/p>\n<p><span class=\"duration\">5:11<\/span><\/p>\n<\/div>\n<\/div>\n<p>All facial recognition systems capture either a two- or three-dimensional image of a subject&#8217;s face, and then <a href=\"https:\/\/www.eff.org\/pages\/face-recognition\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">compare key information from that image to a database of known images<\/a>. For law enforcement, that database could be collected from mugshots. For smart home cameras, the data likely comes from pictures of people you&#8217;ve identified as relatives or friends via the accompanying app.&nbsp;<\/p>\n<p>Woodrow &#8220;Woody&#8221; Bledsoe <a href=\"https:\/\/www.cs.utexas.edu\/~boyer\/bledsoe-memorial-resolution.pdf\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">first developed facial recognition software<\/a> at a firm called Panoramic Research back in the 1960s using two-dimensional images, with funding for the research coming from an unnamed intelligence agency.<\/p>\n<p>Even now, <a href=\"https:\/\/www.epic.org\/privacy\/facerecognition\/#hist\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">most facial recognition systems rely on 2D images<\/a>, either because the camera doesn&#8217;t have the ability to capture depth information &#8212; such as the length of your nose or the depth of your eye socket &#8212; or because the reference database consists of 2D images such as mugshots or passport photos.<\/p>\n<p>2D facial recognition <a href=\"https:\/\/www.fi.edu\/understanding-facial-recognition-software\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">primarily uses landmarks<\/a> such as the nose, mouth and eyes to identify a face, gauging both the width and shape of the features, and the distance between the various features of the face. Those measurements are converted to a numerical code by facial recognition software, which is used to find matches. This code is called a faceprint.<\/p>\n<p>This geometric system can struggle with different angles and lighting. A straight-on shot of a face will show a different distance from nose to eyes, for instance, than a shot of a face turned to the side. The problem can be somewhat mitigated by mapping the 2D image onto a 3D model and undoing the rotation.<\/p>\n<p><span class=\"caption\">Apple uses a 3D facial recognition system called Face ID. It&#8217;s good, but not perfect.&nbsp;<\/span><\/p>\n<p><span class=\"credit\">Morgan Little\/CNET<\/span><\/p>\n<h2>Adding a third dimension<\/h2>\n<p>3D facial recognition software isn&#8217;t&nbsp;<a href=\"https:\/\/www.technologyreview.com\/s\/407976\/better-face-recognition-software\/\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">as easily fooled<\/a> by angles and light and doesn&#8217;t rely on average head size to guess at a faceprint. With cameras that sense depth, the faceprint can include the contours and curve of the face as well as depth of the eyes and distances from points like the tip of your nose.<\/p>\n<p>Most cameras gauge this depth by <a href=\"http:\/\/spie.org\/newsroom\/facial-recognition?SSO=1\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">projecting invisible spectrums of light<\/a> onto a face and using sensors to capture the distance of various points of this light from the camera itself. Even though these 3D sensors can capture much more detail than a 2D version, the basis of the technology remains the same &#8212; turning the various shapes, distances and depths of a face into a numerical code and matching that code to a database.<\/p>\n<p>If that database consists of 2D images, software needs to convert the 3D faceprint back to a 2D faceprint to get a match.<\/p>\n<p>Apple&#8217;s <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/apple-face-id-truedepth-how-it-works\/\">Face ID uses 30,000 infrared dots<\/a><\/span> that map the contours of your face. The iPhone then remembers the relative location of those dots the next time you try to unlock your phone.<\/p>\n<p>Even these more advanced systems can be defeated by something as simple as different facial expressions, wearing glasses or scarves that obscure parts of your face. <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/iphones-face-id-problems-tricks-tips\/\">Apple&#8217;s Face ID can struggle<\/a><\/span> to match your tired, squinting, just-woke-up face to your made-up, caffeinated, ready-for-the-day face.<\/p>\n<div class=\"shortcode video v2\" data-video-playlist=\"[{&quot;id&quot;:&quot;0b0668d1-1940-4f53-a270-0668fa6a3570&quot;,&quot;title&quot;:&quot;The Property Brothers can trick Face ID&quot;,&quot;description&quot;:&quot;We meet the Property Brothers -- Jonathan and Drew Scott -- for a technology-themed round of \\u0022Know Your Brother.\\u0022 Oh, yeah, and Drew can unlock Jonathan\\u0027s iPhone with his face.&quot;,&quot;slug&quot;:&quot;the-property-brothers-can-trick-face-id&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;datePublished&quot;:&quot;2018-11-13 14:37:00&quot;,&quot;duration&quot;:154,&quot;mpxRefId&quot;:&quot;yMGFKi_ekDtBaEzTyDEnYbR0qf7hZuPs&quot;,&quot;ratingVChip&quot;:&quot;TV-14&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;edf5b695-639a-49d7-8be7-c7fad1f30849&quot;},&quot;author&quot;:{&quot;id&quot;:&quot;a17ed33c-8245-11e3-b21f-14feb5ca9861&quot;,&quot;firstName&quot;:&quot;Joan E.&quot;,&quot;lastName&quot;:&quot;Solsman&quot;},&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;6fcb322f-9ea7-49cc-873e-a56053cd663f&quot;,&quot;title&quot;:&quot;Special Features&quot;},&quot;image&quot;:{&quot;path&quot;:&quot;https:\\\/\\\/cnet4.cbsistatic.com\\\/img\\\/8L3u4J7H3NndZJqjuwsdahbyFXY=\\\/1280x720\\\/2018\\\/11\\\/12\\\/6142c908-d8af-4d65-84c3-07da7e08f626\\\/propbros-still.jpg&quot;},&quot;thumbnail&quot;:&quot;https:\\\/\\\/cnet3.cbsistatic.com\\\/img\\\/B7vMKnlA8A0xOHoDZLLv0JRzWOA=\\\/194x109\\\/2018\\\/11\\\/12\\\/6142c908-d8af-4d65-84c3-07da7e08f626\\\/propbros-still.jpg&quot;,&quot;closedCaptionPath&quot;:&quot;\\\/videos\\\/captions\\\/dfxp\\\/the-property-brothers-can-trick-face-id.xml&quot;,&quot;urlPath&quot;:&quot;\\\/videos\\\/the-property-brothers-can-trick-face-id\\\/&quot;,&quot;isVertical&quot;:false,&quot;m3u8&quot;:&quot;\\\/videos\\\/manifest\\\/the-property-brothers-can-trick-face-id.m3u8&quot;,&quot;mp4&quot;:&quot;https:\\\/\\\/cnetmedia-a.akamaihd.net\\\/21923\\\/2018\\\/11\\\/12\\\/1368451651791\\\/PropertyBros_FINAL2_1710060_740.mp4&quot;,&quot;index&quot;:0}]\" readability=\"6\">\n<div class=\"embeddedVideoContainer\" tabindex=\"0\" aria-label=\"Play video The Property Brothers can trick Face ID\" data-load-video=\"0\" data-video-id=\"0b0668d1-1940-4f53-a270-0668fa6a3570\" readability=\"7\">\n<div class=\"videoContainer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/B7vMKnlA8A0xOHoDZLLv0JRzWOA=\/194x109\/2018\/11\/12\/6142c908-d8af-4d65-84c3-07da7e08f626\/propbros-still.jpg\" class=\"photo\" alt height=\"109\" width=\"194\"><\/div>\n<p><span class=\"bold\"><span class=\"nowPlaying\">Now playing:<\/span> <span class=\"watchThis\">Watch this:<\/span><\/span> The Property Brothers can trick Face ID<\/p>\n<p><span class=\"duration\">2:34<\/span><\/p>\n<\/div>\n<\/div>\n<h2>Reading your pores<\/h2>\n<p>A more recent development, called skin texture analysis, could help future applications overcome all of these challenges. <a href=\"https:\/\/electronics.howstuffworks.com\/gadgets\/high-tech-gadgets\/facial-recognition.htm\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">Developed by Identix<\/a>, a tech company focused on developing secure means of identification, skin texture analysis differentiates itself by functioning at a much smaller scale. Instead of measuring the distance between your nose and your eyes, it measures the distance between your pores. It then converts those numbers into a mathematical code. This code is called a skinprint.<\/p>\n<p>This method could theoretically be so precise that it can tell the difference between twins. Currently, Identix is working to integrate into facial recognition systems alongside a more normal 3D face map. The company claims the tech increases accuracy by 25 percent.<\/p>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/facial-recognition-apple-amazon-google-and-the-race-for-your-face-facebook\/\" class=\"lazy\" alt=\"face-id-recognition-6\" data-original=\"https:\/\/cnet4.cbsistatic.com\/img\/AHPp6wFlCQylQfHdrW0CeXbmp2E=\/724x0\/2019\/03\/15\/da7867d4-dc67-42e0-9671-84a3ac3434f4\/face-id-recognition-6.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet4.cbsistatic.com\/img\/AHPp6wFlCQylQfHdrW0CeXbmp2E=\/724x0\/2019\/03\/15\/da7867d4-dc67-42e0-9671-84a3ac3434f4\/face-id-recognition-6.jpg\" class alt=\"face-id-recognition-6\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">Your face can be turned into a code.&nbsp;<\/span><\/p>\n<p><span class=\"credit\">James Martin\/CNET<\/span><\/p>\n<h2>Where is facial recognition being used?<\/h2>\n<p>While Bledsoe laid the groundwork for the tech, modern facial recognition began in earnest in the 1980s and &#8217;90s <a href=\"https:\/\/www.bostonglobe.com\/ideas\/2014\/11\/23\/facial-recognition-technology-goes-way-back\/CkWaxzozvFcveQ7kvdLHGI\/story.html\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">thanks to mathematicians at MIT<\/a>. Since then, facial recognition has been integrated into all manner of commercial and institutional applications with varying degrees of success.<\/p>\n<p><span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/china-turns-to-tech-to-monitor-shame-and-rate-citizens\/\">The Chinese government uses facial recognition<\/a><\/span> for large-scale surveillance in public CCTV cameras, both to catch criminals and monitor the behavior of all individuals with the intent of turning the data into a score. Seemingly harmless offenses like buying too many <a href=\"https:\/\/www.cnet.com\/topics\/video-games\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Video Games|CNET_CAT_TOPIC|975&quot;}\">video games<\/a> or jaywalking can lower your score. China uses that score for a sort of &#8220;social credit&#8221; system that determines whether the individual should be allowed to get a loan, buy a house or even much simpler things like board a plane or access the internet.<\/p>\n<p>The <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/london-police-commissioner-dont-expect-lots-of-arrests-from-facial-recognition-tech\/\">London Metropolitan Police also use it as a tool<\/a><\/span> when narrowing their search for criminals, though <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/facial-recognition-software-inaccurate-in-98-of-metropolitan-police-cases-reports\/\">their system supposedly isn&#8217;t very accurate<\/a><\/span> &#8212; with incorrect matches reported in a whopping 98 percent of cases. In the US, <a href=\"https:\/\/www.cnet.com\/news\/facial-recognition-overkill-how-deputies-cracked-a-12-shoplifting-case\/\">police departments in Oregon<\/a>&nbsp;<span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/amazon-is-selling-facial-recognition-technology-to-law-enforcement\/\">and Florida<\/a><\/span> are teaming up with <a href=\"https:\/\/www.cnet.com\/tags\/amazon\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Amazon|CNET_TAG|408&quot;}\">Amazon<\/a> to install facial recognition into government-owned cameras.<\/p>\n<p>Facial recognition is <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/facial-recognition-trial-takes-off-at-sydney-airport-biometrics\/\">undergoing trials at airports<\/a><\/span> to help move people through security more quickly. The <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/secret-service-to-test-facial-recognition-tech-around-white-house\/\">Secret Service is testing facial recognition systems<\/a><\/span> around the White House. <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/taylor-swift-reportedly-used-facial-recognition-tech-to-identify-stalkers\/\">Taylor Swift even used it to help identify stalkers<\/a><\/span> at one of her concerts. <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/how-facial-recognition-idd-the-capital-gazette-shooter\/\">Facial recognition famously led to the arrest of the Capital Gazette shooter<\/a><\/span> in 2018 by matching a picture of the suspect to an image repository of mugshots and pictures from driver&#8217;s licenses. The <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/tokyo-olympics-will-use-facial-recognition-to-improve-security\/\">upcoming 2020 Olympics in Tokyo will be the first to use facial recognition<\/a><\/span> to help improve security.<\/p>\n<p>Facial recognition could have large implications for retail outlets and marketers as well, beyond simply watching for thieves. At <a href=\"https:\/\/www.cnet.com\/ces\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|CES|CNET_EVERGREEN|436&quot;}\">CES<\/a> 2019, consumer goods giant <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/the-future-of-makeup-counters-came-to-ces-2019\/\">Procter &amp; Gamble showed a concept store<\/a><\/span> where cameras could recognize your face and make personalized shopping recommendations.<\/p>\n<div class=\"shortcode video v2\" data-video-playlist=\"[{&quot;id&quot;:&quot;92b29d7d-f5ef-4eed-a4d2-e1e5bf973a77&quot;,&quot;title&quot;:&quot;Nest Hello video doorbell: Smarter than your average buzzer&quot;,&quot;description&quot;:&quot;The $229 Nest Hello video doorbell has features you won\\u0027t find on other buzzers.&quot;,&quot;slug&quot;:&quot;nest-hello-video-doorbell-smarter-than-your-average-buzzer&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;datePublished&quot;:&quot;2018-03-17 12:24:00&quot;,&quot;duration&quot;:159,&quot;mpxRefId&quot;:&quot;WST_IhSJEO9gLJPojq6t5zsl915T6pO9&quot;,&quot;ratingVChip&quot;:&quot;TV-14&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;1bd51323-c387-11e2-8208-0291187b029a&quot;},&quot;author&quot;:{&quot;id&quot;:&quot;961c6f7f-8245-11e3-b21f-14feb5ca9861&quot;,&quot;firstName&quot;:&quot;Megan&quot;,&quot;lastName&quot;:&quot;Wollerton&quot;},&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;2adf6930-fe69-4423-ab9c-9aae7f4f1fc2&quot;,&quot;title&quot;:&quot;CNET First Look&quot;},&quot;image&quot;:{&quot;path&quot;:&quot;https:\\\/\\\/cnet4.cbsistatic.com\\\/img\\\/wG_bunLBaVGOA5vmGEuD4J8IWIg=\\\/1280x720\\\/2018\\\/03\\\/16\\\/43f1206d-bdf9-439a-8150-60ef888b5655\\\/fl-nest-hello0.jpg&quot;},&quot;thumbnail&quot;:&quot;https:\\\/\\\/cnet3.cbsistatic.com\\\/img\\\/M6g2wzGc52mfoh9xeLHl60PIpAc=\\\/194x109\\\/2018\\\/03\\\/16\\\/43f1206d-bdf9-439a-8150-60ef888b5655\\\/fl-nest-hello0.jpg&quot;,&quot;closedCaptionPath&quot;:&quot;\\\/videos\\\/captions\\\/dfxp\\\/nest-hello-video-doorbell-smarter-than-your-average-buzzer.xml&quot;,&quot;urlPath&quot;:&quot;\\\/videos\\\/nest-hello-video-doorbell-smarter-than-your-average-buzzer\\\/&quot;,&quot;isVertical&quot;:false,&quot;m3u8&quot;:&quot;\\\/videos\\\/manifest\\\/nest-hello-video-doorbell-smarter-than-your-average-buzzer.m3u8&quot;,&quot;mp4&quot;:&quot;https:\\\/\\\/cnetmedia-a.akamaihd.net\\\/21923\\\/2018\\\/03\\\/16\\\/1188008003590\\\/FL_Nest_Hello_1367788_740.mp4&quot;,&quot;index&quot;:0}]\" readability=\"6\">\n<div class=\"embeddedVideoContainer\" tabindex=\"0\" aria-label=\"Play video Nest Hello video doorbell: Smarter than your average buzzer\" data-load-video=\"0\" data-video-id=\"92b29d7d-f5ef-4eed-a4d2-e1e5bf973a77\" readability=\"7\">\n<div class=\"videoContainer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/M6g2wzGc52mfoh9xeLHl60PIpAc=\/194x109\/2018\/03\/16\/43f1206d-bdf9-439a-8150-60ef888b5655\/fl-nest-hello0.jpg\" class=\"photo\" alt height=\"109\" width=\"194\"><\/div>\n<p><span class=\"bold\"><span class=\"nowPlaying\">Now playing:<\/span> <span class=\"watchThis\">Watch this:<\/span><\/span> Nest Hello video doorbell: Smarter than your average&#8230;<\/p>\n<p><span class=\"duration\">2:39<\/span><\/p>\n<\/div>\n<\/div>\n<h2>Bringing facial recognition home<\/h2>\n<p>Aside from large-scale installations, facial recognition has several uses in consumer products. Beyond iPhones, some <a href=\"https:\/\/www.cnet.com\/topics\/phones\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Phones|CNET_CAT_TOPIC|1275&quot;}\">phones<\/a> with Google&#8217;s Android operating system like the <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/reviews\/google-pixel-2-review\/\">Google Pixel 2<\/a><\/span> and the <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/reviews\/samsung-galaxy-s9-review\/\">Samsung Galaxy S9<\/a><\/span> are capable of facial recognition, but the <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/samsung-galaxy-s9-intelligent-scan-unlock-favors-ease-over-security\/\">technology on Android isn&#8217;t yet secure enough to verify mobile payments<\/a><\/span>. The next version of Android is <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/android-q-might-have-facial-recognition-similar-to-apples-face-id\/\">expected to get a more secure facial recognition system<\/a><\/span> closer to Apple&#8217;s Face ID, although Samsung did not incorporate any facial recognition into its newest phone, the <a href=\"https:\/\/www.cnet.com\/reviews\/samsung-galaxy-s10-plus-review\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Samsung Galaxy S10 Plus|CNET_FAM_SERIES|375&quot;}\">Galaxy S10<\/a> <span section=\"inline-annotation|leads\">(<a href=\"https:\/\/assoc-redirect.amazon.com\/g\/r\/https:\/\/www.amazon.com\/Samsung-Galaxy-Factory-Unlocked-Warranty\/dp\/B07N4KCW4X?psc=1&amp;SubscriptionId=AKIAJ3NOW7JKGQLTEY4A&amp;tag=cnet-api-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B07N4KCW4X&amp;ascsubtag=___VIEW_GUID___\" target=\"_blank\" rel=\"nofollow\" data-component=\"leadsTracker\" data-leads-tracker-options=\"{&quot;numNodes&quot;:3,&quot;trackingData&quot;:{&quot;asid&quot;:&quot;&quot;,&quot;assetguid&quot;:&quot;7b51355c-8dee-40af-8f27-9bc7adec3a63&quot;,&quot;contype&quot;:&quot;magnet_article&quot;,&quot;destUrl&quot;:&quot;https:\\\/\\\/assoc-redirect.amazon.com\\\/g\\\/r\\\/https:\\\/\\\/www.amazon.com\\\/Samsung-Galaxy-Factory-Unlocked-Warranty\\\/dp\\\/B07N4KCW4X?psc=1&amp;SubscriptionId=AKIAJ3NOW7JKGQLTEY4A&amp;tag=cnet-api-20&amp;linkCode=xm2&amp;camp=2025&amp;creative=165953&amp;creativeASIN=B07N4KCW4X&quot;,&quot;devicetype&quot;:&quot;desktop&quot;,&quot;leadcpc&quot;:&quot;&quot;,&quot;ltype&quot;:&quot;mlst&quot;,&quot;merid&quot;:300346,&quot;pagetype&quot;:&quot;article&quot;,&quot;pid&quot;:&quot;&quot;,&quot;rsid&quot;:&quot;cbsicnetglobalsite&quot;,&quot;siteid&quot;:&quot;1&quot;,&quot;topic&quot;:&quot;&quot;,&quot;ttag&quot;:&quot;amazon&quot;,&quot;viewguid&quot;:&quot;&quot;,&quot;assettitle&quot;:&quot;samsung-galaxy-s10-plus-128gb-prism-white&quot;,&quot;campaign&quot;:&quot;amazon&quot;,&quot;ctype&quot;:&quot;cpc&quot;,&quot;cval&quot;:85,&quot;leadCpc&quot;:0.85,&quot;mfgid&quot;:6231897,&quot;mfr&quot;:&quot;at-t&quot;,&quot;ontid&quot;:&quot;&quot;,&quot;pdguid&quot;:&quot;863d52cc-5cc5-47c2-83f1-dd733f459079&quot;,&quot;productId&quot;:&quot;863d52cc-5cc5-47c2-83f1-dd733f459079&quot;,&quot;productName&quot;:&quot;samsung galaxy s10 plus (128gb, prism white)&quot;,&quot;productSeriesId&quot;:&quot;ede33aec-66b9-406b-9807-f8ce9a1aa000&quot;,&quot;seourl&quot;:&quot;https:\\\/\\\/www.cnet.com\\\/reviews\\\/samsung-galaxy-s10-plus-review\\\/&quot;,&quot;sl&quot;:&quot;en&quot;,&quot;topicbrcrm&quot;:&quot;Mobile:Phones&quot;,&quot;topicguid&quot;:&quot;1c5a20d4-c387-11e2-8208-0291187b029a&quot;,&quot;leadProdPrice&quot;:1000}}\" class=\"inlineAnnotation norewrite nolinks\">$1,000 at Amazon<\/a>)<\/span>, as many industry watchers had expected.<\/p>\n<p>Facebook has used facial recognition for years to suggest tags for pictures. Other photo applications, such as Google Photos, are <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/google-photos-live-albums-automatically-adds-and-organizes-your-photos\/\">getting better at doing the same<\/a><\/span>.<\/p>\n<p>In the smart home, after starting as a niche feature in connected cams such as the <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/reviews\/netatmo-welcome-review\/\">Netatmo Welcome<\/a><\/span>, facial recognition is now built into several popular models, including the <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/reviews\/nest-hello-review\/\">Nest Hello video doorbell<\/a><\/span>. We saw a bunch of <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/tuya-smarts-home-security-system-ids-faces-ces-2019\/\">new gadgets with the tech on display at CES 2019<\/a><\/span>.<\/p>\n<div class=\"shortcode gallery\" section=\"shortcodeGallery\">\n<div data-item=\"image\" section=\"galleryItem.1\" readability=\"6\"><a href=\"https:\/\/www.cnet.com\/pictures\/security-cameras-with-facial-recognition-tech-inside\/\" data-component=\"imageGalleryModal\" data-image-gallery-modal-options=\"{&quot;url&quot;:&quot;\\\/pictures\\\/security-cameras-with-facial-recognition-tech-inside\\\/xhr\\\/&quot;,&quot;trackUrl&quot;:&quot;\\\/pictures\\\/security-cameras-with-facial-recognition-tech-inside\\\/&quot;,&quot;index&quot;:1,&quot;cssPath&quot;:&quot;https:\\\/\\\/cnet4.cbsistatic.com\\\/fly\\\/css\\\/image_gallery\\\/single.desktop-cfef71eee5-rev.css&quot;}\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/cclb1LOolWmB6Qc33_b2r5yZPpY=\/724x407\/2017\/06\/27\/7715d7e9-9fe9-42ea-8253-3c326f353a34\/nest-cam-iq-1.jpg\" class alt=\"honeywell-security-1\" height=\"407\" width=\"724\"><\/a><\/p>\n<div class=\"title\" readability=\"7\">Security cameras with facial recognition tech inside<\/p>\n<p>8 Photos<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>Connected cams compare faces with others they&#8217;ve seen before so you can customize notifications based on who the camera sees. <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/the-best-facial-recognition-cameras-of-2019\/\">All the models we&#8217;ve tested<\/a><\/span> take a while to learn faces, as they need to be able to recognize the members of your household at various angles and in various outfits. Once the cameras learn, you can use facial recognition to make your connected security system that much smarter by making your notifications more relevant to what you actually want to know.<\/p>\n<p>Beyond the security uses in the home, even robots like <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/lovot-is-japans-effort-to-spread-love-via-robots\/\">Lovot<\/a><\/span> and <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/my-week-with-aibo-what-its-like-to-live-with-sonys-robot-dog\/\">Sony&#8217;s Aibo robot dog<\/a><\/span> can recognize faces. Aibo and others learn faces not to track who comes and goes, but to adapt to the specific preferences of different people over time.<\/p>\n<div class=\"shortcode video v2\" data-video-playlist=\"[{&quot;id&quot;:&quot;ad1110df-ad8c-43de-98b2-114bd645bc9c&quot;,&quot;title&quot;:&quot;My week living with Aibo, Sony\\u2019s robot dog&quot;,&quot;description&quot;:&quot;Bridget Carey takes Aibo for a test run to see what it\\u0027s like for a family to live with a robot dog, and how different people (and animals) react to this new species of pet.&quot;,&quot;slug&quot;:&quot;my-week-living-with-aibo-sonys-robot-dog&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;datePublished&quot;:&quot;2018-11-28 14:00:54&quot;,&quot;duration&quot;:415,&quot;mpxRefId&quot;:&quot;ML8O0r2tu3iA93zjEJuLn1YPeKl77fVD&quot;,&quot;ratingVChip&quot;:&quot;TV-14&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;1bd51323-c387-11e2-8208-0291187b029a&quot;},&quot;author&quot;:{&quot;id&quot;:&quot;95981d0c-8175-11e2-9d12-0018fe8a00b0&quot;,&quot;firstName&quot;:&quot;Bridget&quot;,&quot;lastName&quot;:&quot;Carey&quot;},&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;6fcb322f-9ea7-49cc-873e-a56053cd663f&quot;,&quot;title&quot;:&quot;Special Features&quot;},&quot;image&quot;:{&quot;path&quot;:&quot;https:\\\/\\\/cnet4.cbsistatic.com\\\/img\\\/sHjAXlXMMkiPbFq643v3lh8qBGw=\\\/1280x720\\\/2018\\\/11\\\/27\\\/70405aa4-124d-4230-8e49-81fb28f801da\\\/aibo-3.jpg&quot;},&quot;thumbnail&quot;:&quot;https:\\\/\\\/cnet3.cbsistatic.com\\\/img\\\/2Vkb-kfjUQGDeO1wp_NKX8E0Tz0=\\\/194x109\\\/2018\\\/11\\\/27\\\/70405aa4-124d-4230-8e49-81fb28f801da\\\/aibo-3.jpg&quot;,&quot;closedCaptionPath&quot;:&quot;\\\/videos\\\/captions\\\/dfxp\\\/my-week-living-with-aibo-sonys-robot-dog.xml&quot;,&quot;urlPath&quot;:&quot;\\\/videos\\\/my-week-living-with-aibo-sonys-robot-dog\\\/&quot;,&quot;isVertical&quot;:false,&quot;m3u8&quot;:&quot;\\\/videos\\\/manifest\\\/my-week-living-with-aibo-sonys-robot-dog.m3u8&quot;,&quot;mp4&quot;:&quot;https:\\\/\\\/cnetmedia-a.akamaihd.net\\\/21923\\\/2018\\\/11\\\/27\\\/1381818947975\\\/SpecialFeauture_AIBO_1_1721488_740.mp4&quot;,&quot;index&quot;:0}]\" readability=\"6.5\">\n<div class=\"embeddedVideoContainer\" tabindex=\"0\" aria-label=\"Play video My week living with Aibo, Sony\u2019s robot dog\" data-load-video=\"0\" data-video-id=\"ad1110df-ad8c-43de-98b2-114bd645bc9c\" readability=\"8\">\n<div class=\"videoContainer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/2Vkb-kfjUQGDeO1wp_NKX8E0Tz0=\/194x109\/2018\/11\/27\/70405aa4-124d-4230-8e49-81fb28f801da\/aibo-3.jpg\" class=\"photo\" alt height=\"109\" width=\"194\"><\/div>\n<p><span class=\"bold\"><span class=\"nowPlaying\">Now playing:<\/span> <span class=\"watchThis\">Watch this:<\/span><\/span> My week living with Aibo, Sony\u2019s robot dog<\/p>\n<p><span class=\"duration\">6:55<\/span><\/p>\n<\/div>\n<\/div>\n<h2>What are the implications?<\/h2>\n<p>Unlike other forms of biometric authentication, cameras can gather information about your face with or without your knowledge or consent. If you&#8217;re a privacy-minded person, you could potentially be exposing your data when in a public place without knowing it.&nbsp;<\/p>\n<p>Because the technology is so new, there aren&#8217;t any laws in the US limiting what companies can do with images of your face after they capture it. A <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/senators-introduce-facial-recognition-bill-to-stop-businesses-from-tracking-you\/\">bipartisan bill was recently introduced in the Senate<\/a><\/span>&nbsp;to rectify the lack of regulation.&nbsp;<\/p>\n<p>The <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/aclu-wants-amazon-to-stop-offering-surveillance-technology-rekognition\/\">American Civil Liberties Union delivered a petition<\/a><\/span> to Amazon last year asking it to stop giving its facial recognition technology to law enforcement agencies and the government, calling the prospect &#8220;a user manual for authoritarian surveillance.&#8221;<\/p>\n<p>According to a <a href=\"https:\/\/www.buzzfeednews.com\/article\/daveyalba\/these-documents-reveal-the-governments-detailed-plan-for\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">report by Buzzfeed<\/a>, the US Customs and Border Protection agency plans to implement facial recognition to verify the identity of passengers on international flights in airports across the country. The Electronic Privacy Information Center shared documents with Buzzfeed that suggested the UCB skipped over gathering public feedback before starting to implement these systems, and that they have a questionable accuracy rate and little established privacy regulations as far as what the airlines can do with this facial data after they collect it.<\/p>\n<p><a href=\"https:\/\/www.nbcnews.com\/tech\/internet\/facial-recognition-s-dirty-little-secret-millions-online-photos-scraped-n981921\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">NBC News reported<\/a> that the databases of pictures used to improve facial recognition often comes from social media sites without the consent of the subject or photographer. Companies like IBM have the stated goal of using these images to try and improve the accuracy of facial recognition, particularly among people of color. Theoretically, by ingesting the data from a large catalog of faces, the system can fine tune its algorithms to account for a larger variety of facial structures.<\/p>\n<p>The <a href=\"https:\/\/www.eff.org\/pages\/face-recognition\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener\">Electronic Frontier Foundation notes<\/a> that current facial recognition systems tend to produce a disproportionately high number of false positives when identifying minorities. NBC&#8217;s story also details how it can be tedious to impossible for private citizens to opt out of using their pictures in these databases.<\/p>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/facial-recognition-apple-amazon-google-and-the-race-for-your-face-facebook\/\" class=\"lazy\" alt=\"ring-video-doorbell-two-1\" data-original=\"https:\/\/cnet4.cbsistatic.com\/img\/1J0k8zt3JudY1swxrvkNf9QgsiE=\/724x0\/2017\/06\/29\/b3e13705-5b25-4a44-9cf7-8718bae689c6\/ring-video-doorbell-two-1.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet4.cbsistatic.com\/img\/1J0k8zt3JudY1swxrvkNf9QgsiE=\/724x0\/2017\/06\/29\/b3e13705-5b25-4a44-9cf7-8718bae689c6\/ring-video-doorbell-two-1.jpg\" class alt=\"ring-video-doorbell-two-1\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">The Ring Doorbell would have watched for suspicious individuals.&nbsp;<\/span><\/p>\n<p><span class=\"credit\">Chris Monroe\/CNET<\/span><\/p>\n<p><span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/facebook-to-face-class-action-lawsuit-over-facial-recognition\/\">Facebook faces a class action lawsuit<\/a><\/span> over its own facial recognition technology, called DeepFace, which identified people in photos without their consent. Smart home company Ring, an Amazon subsidiary, also <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/amazons-ring-takes-heat-for-considering-facial-recognition-for-its-video-doorbells\/\">came under fire last year for filing patents based on facial technology that could have violated civil rights<\/a><\/span>.<\/p>\n<p>Ring&#8217;s video doorbells would have monitored neighborhoods for known sex offenders and those on &#8220;most wanted&#8221; lists and could then have automatically notified law enforcement. The idea was criticized as likely to target those unfairly deemed a threat and potentially even political activists.<\/p>\n<p>The science behind facial recognition is certainly exciting, and the tech could lead to a safer and more personal smart home, but facial recognition could easily result in a loss of privacy, unjust profiling and violations of personal rights. While the impact of facial recognition is still being determined and debated, it&#8217;s important to recognize that facial recognition is no longer some distant concept reserved for science fiction. For better or worse, facial recognition is here now and spreading quickly.&nbsp;<\/p>\n<p>Check back throughout the month as CNET dives deeper into the implications of this developing technology.<\/p>\n<p>Published March 18 at 5:00 a.m. PT<br \/><strong>Update<\/strong>, 3:00 p.m. PT.<\/p>\n<div class=\"col-7 m-linkstack\">\n<div class=\"titleGroup desktop\">\n<p><h2>CNET Smart Home<\/h2>\n<\/p>\n<\/div>\n<\/div>\n<footer class=\"row\"> <\/footer>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29943\/Facial-Recognition-101-Your-Face-Is-Your-New-Fingerprint.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26203,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[6157],"class_list":["post-26202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinepasswordscience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Facial Recognition 101: Your Face Is Your New Fingerprint 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Facial Recognition 101: Your Face Is Your New Fingerprint 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T14:48:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"370\" \/>\n\t<meta property=\"og:image:height\" content=\"239\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Facial Recognition 101: Your Face Is Your New Fingerprint\",\"datePublished\":\"2019-03-18T14:48:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/\"},\"wordCount\":2253,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg\",\"keywords\":[\"headline,password,science\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/\",\"name\":\"Facial Recognition 101: Your Face Is Your New Fingerprint 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg\",\"datePublished\":\"2019-03-18T14:48:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg\",\"width\":370,\"height\":239},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/facial-recognition-101-your-face-is-your-new-fingerprint\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,password,science\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinepasswordscience\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Facial Recognition 101: Your Face Is Your New Fingerprint\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Facial Recognition 101: Your Face Is Your New Fingerprint 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/","og_locale":"en_US","og_type":"article","og_title":"Facial Recognition 101: Your Face Is Your New Fingerprint 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-18T14:48:13+00:00","og_image":[{"width":370,"height":239,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Facial Recognition 101: Your Face Is Your New Fingerprint","datePublished":"2019-03-18T14:48:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/"},"wordCount":2253,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg","keywords":["headline,password,science"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/","url":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/","name":"Facial Recognition 101: Your Face Is Your New Fingerprint 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg","datePublished":"2019-03-18T14:48:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/facial-recognition-101-your-face-is-your-new-fingerprint.jpg","width":370,"height":239},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/facial-recognition-101-your-face-is-your-new-fingerprint\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,password,science","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinepasswordscience\/"},{"@type":"ListItem","position":3,"name":"Facial Recognition 101: Your Face Is Your New Fingerprint"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26202"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26202\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26203"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}