zlacker

[return to "Humanness in the Age of AI"]
1. latexr+Lm[view] [source] 2023-04-01 09:45:26
>>allanb+(OP)
Sam Altman is behind both OpenAI and Worldcoin, the latter being a well known scam to gather biometric data.

So Sam Altman first creates the situation that we can no longer distinguish humans from bots, then asks everyone to trust him with even more biometric data to get around the problem he created.

Either way he wins at everyone else’s expense. I urge you to not take this at face value, Sam has already shown with Worldcoin that he is not trustworthy.

https://www.buzzfeednews.com/article/richardnieva/worldcoin-...

◧◩
2. capabl+rF[view] [source] 2023-04-01 13:00:25
>>latexr+Lm
I don't know the exact implementation of Worldcoin, so correct me if I'm wrong here.

But theoretically, you could implement the protocol in a privacy-preserving manner where the only thing that needs to be saved, is the hash of the biometric data, not the biometric data itself.

So lets say that your face + fingerprint + iris each outputs a value. Concat those and hash them, and you have a unique value that can be reproduced elsewhere, without having to store anything else but the actual hash of the input.

Again, I'm not sure if this is what they are doing, but if that's how it works, they wouldn't actually need to gather any biometric data, after creating the hash it can be thrown away.

◧◩◪
3. ritzac+fY[view] [source] 2023-04-01 15:43:26
>>capabl+rF
at the point where you regularly have to scan that combination into a potentially malicious or compromised machine that knows how to generate and transmit the hash, you may as well just trust some centralised authority to store the originals.

If someone MITMs your password, you can rotate it. A bit harder to do that with your iris.

Of course, true for fingerprint scanning too which has been around for a while, but iris kind of takes that to a new minority report level for many.

◧◩◪◨
4. capabl+9q1[view] [source] 2023-04-01 18:47:22
>>ritzac+fY
> at the point where you regularly have to scan that combination into a potentially malicious or compromised machine that knows how to generate and transmit the hash, you may as well just trust some centralised authority to store the originals.

Why would you have to do that regularly? The point is to do it once in a trusted environment and then the only thing you need to verify whatever is the hash itself, not to re-encode again and again.

[go to top]