Close

Delete Collection?

Are you sure you want to delete this collection permanently?

Close

Delete Collection?

Are you sure you want to delete this collection permanently?

Everyone has a Story to Tell and an Experience to Share!

Let’s Start Writing
9bfb6e8f-90c0-4c0b-b03e-02c43cf575db

Will Apple Be the New Mission: Impossible?

Call Tom Cruise. We have the newest film in the franchise thanks to machine learning and facial ID recognition.

Cue the theme song. Start ducking in and out with your imaginary gun as you defy the odds and accomplish death-defying feats of daring do...with your Apple computer?? Wait, what??

Truly this isn't far from the truth, if you think about it. After all, I don't think Ethan Hunt would think twice about carrying around his iPhone anywhere. After all, that's primo technology especially after checking out the goods on what Apple's got coming in this industry. It's huge.

The Newest Thing Apple Is Doing Is Leveraging Machine Learning to Incorporate Facial ID

#

We're actually already seeing that with the newest iPhones out there. Biometrics is where it's at. Combine that with artificial intelligence, and that's the new age, a true science fiction turned reality that could throw Tom Cruise into a real-life minority report! This is data security at its best, but let's be honest here: is this a good thing? Or is this more opportunity for hackers and cyber-terrorists?

Here's the thing about facial recognition: the problem is the absence of active intent. With other processes, such as two-factor authentication systems, CAPTCHAs and the like, you actively have to enter in the codes or fingerprints to access those systems successfully. Facial recognition actually doesn't necessarily require any active intent.

In other words, you don't even have to be aware that your face is being scanned. Let that sink into your brain for a moment and imagine the possibilities of cyber-terrorism.

However, realistically it would be a hard-pressed task for a hacker to manage that, but we've seen crazier things -- like Ethan Hunt scaling a mountain or building. And self-lacing sneakers, while theoretically hackable, realistically won't ever become a problem for a lot of reasons.

The reason why reality may never see issues with cyber-terrorism and facial recognition is that machine learning algorithms will know the difference. Sure, a teenager can try and break into his/her parents' room and scan his/her mom or dad's face just to hack into the phone. But the system will know the difference based on the fact that the parent's eyes will still be closed (presumably the parent will be asleep).

Photographs won't even work to get past the machine learning algorithm of facial recognition given the data matrix takes into account 3D imaging. Since a "picture" doesn't exist in that 3D world, no one will be successful in breaking or hacking into a system that utilizes this technology. Literally the only way, probably, anyone would be able to hack into the system is if you went through reconstructive surgery, changed your face (like in that John Woo film "Face-Off" with Nicolas Cage and John Travolta), and did it that way. But, hey, that's far-fetched!

We can imagine the only way a hacker could break into such a system is if they had one of those micro-cameras installed in a pair of glasses or some other object to basically "copy" the face of the culprit or victim and relay that matrix to the phone --as long as the hacker has the phone and the owner doesn't know about it.

As far-fetched as it sounds.... Believe it or not, this is a possibility. And a scary one.

Still, This Is Enterprising Technology at Its Best, and Apple's on Top With It

#


Facial recognition isn't simply about the phone taking a simple "picture." The way it's going to work with their new iPhone X is that the device will project a total of 30K potential dots within a scanning environment, much like how a device remembers your fingerprint. Instead, your device will record a literal 3D map of your face, processed in a new A11 Bionic chip that only stores memory directly on the phone.

This is important to understand as you don't want this kind of information stored in the cloud. However, such vital login information only stored on the phone makes for a great opportunity to hack one simple device and access a wealth of information if a hacker could somehow break into it, but that's beside the point.

The result is seamless. You literally only have to put on a pair of glasses with this type of technology integrated into the 'device', and the machine learning in those glasses copies your face and utilizes it as a form of security. Can you even believe that we're this close to having this kind of technology? It's for real.

AI is a powerful driver for data security as it's a framework designed to adapt and analyze. Phishing attacks would then theoretically be a distant memory of the past. Bot networks will go extinct. Social engineering ploys face roadblocks. It'll almost be like facing off against the Eye of Sauron, and no one will be able to get near without being spotted.

We Can Definitely Call Facial Recognition Ironclad.... That Is, Until....

Hackers may undoubtedly find ways and loopholes to compromise such systems, but as long as brands like Apple are keeping tabs and taking names, no one will be compromised. Much. Everything will be just that much more complex -- at least for the professionals designing these new technologies.

Everyone else? We're just going to benefit. Facial recognition technology is super-easy. It's easier than even using your fingerprint. All you do is just stare at your phone! That's it. Talk about convenience. And, of course, given the 3D mapping construct, it's supposed to be that much more secure.

Thank God any of my daughters didn't think of just gently taking my phone and pressing my finger on the button while I'm asleep.

What do you think of this new Mission: Impossible technology? Cool? Or no? SIGN UP FOR A VIGYAA ACCOUNT RIGHT NOW and also be sure to CHECK OUT THE DATA DRIVEN INVESTOR FOR MORE TECHNOLOGY INSIGHTS!



Related Articles

Reference Image
Close