Posts

Showing posts from April, 2021

Risks of Facial Recognition in Gaming

Image
Facial recognition in gaming offers several benefits; the biggest among them is fighting gaming addiction. Thus, when the Chinese government decided to fight the menace of gaming addiction, NetEase and Tencent deployed facial recognition technology to help the campaign. Tencent was the first company to introduce facial recognition with its popular mobile game Honor of Kings ( more details about the game ) and later followed suit with the release of Peacekeeper Elite ( reference ). The anti-addiction system was geared towards limiting the playing time of minors as it is used to verify the identities of players. IDs are cross-referenced with the public security databases. If it’s found that a minor is using an adult’s account to bypass the checks, they will have to go through facial recognition for verification. Suspicious payments or financial transactions will also have to undergo facial recognition for completion.  Tencent claims that privacy protection is their highest priority a...

Privacy and Personal Data

Image
  Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns often revolve around how the data is being shared with third parties and the legality of its collection and storage. The world runs on transactions. Buying and selling. What's more important than introducing your product in a new market to try and gather customers? Introducing your product in a new market with guaranteed customers. And how are these customers guaranteed? Big Data.  When you shop at Amazon, do you ever see a "customers like you also bought ...."? The item being introduced to you have a higher chance of being sold than to a random customer. It's very simple in how it works, but extremely effective. Look at it this way: A company "X" does not have any information on its customers and their interests. In contrast, a company "Y" has...

Cryptography and Quantum Computing

Image
  Quantum mechanics: A term used heavily in pop culture to represent extremely complicated and state-of-the-art technology.  “Quantum computing” is computation performed using a computing device based on the strange, counter-intuitive physical properties of matter at a very small scale, known as quantum mechanics.  Unlike a traditional computer-based on transistors that work with data in binary digits (or “bits”) that can only be a “1” or a “0”, a quantum computer uses bits where a single qubit is able to encode itself as more than two states. The actual science behind it is too complicated for me to get into or even understand fully myself. The technology is starting to get more and more used in cryptography.  “Quantum cryptography” is the science of exploiting quantum mechanical properties to perform cryptographic tasks. A prime example of this is “quantum key distribution”, which enables a secret cryptographic key to be shared between two remote parties such that ...