{"id":4909,"date":"2020-02-26T16:14:23","date_gmt":"2020-02-27T00:14:23","guid":{"rendered":"https:\/\/thetnl.org\/?p=4909"},"modified":"2024-01-29T17:43:57","modified_gmt":"2024-01-30T01:43:57","slug":"what-happens-when-your-security-partner-gets-hacked","status":"publish","type":"post","link":"https:\/\/nostatic.com\/lab\/2020\/02\/26\/what-happens-when-your-security-partner-gets-hacked\/","title":{"rendered":"What happens when your security partner gets hacked?"},"content":{"rendered":"\n<p>Perhaps a rhetorical question, but in this case, given the ethical questions around Clearview&#8217;s activities, the question acquires a bit of irony.<\/p>\n\n\n\n<p>For those that haven&#8217;t heard of Clearview, they provide facial recognition capabilities for law enforcement. They also are very secretive with details about their tech and who they partner with. Well <a href=\"https:\/\/arstechnica.com\/tech-policy\/2020\/02\/clearviews-list-of-law-enforcement-clients-lost-in-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"someone (or some group) has hacked Clearview (opens in a new tab)\">someone (or some group) has hacked Clearview<\/a> and now has that client list. We&#8217;ll see how long it takes for this information to either get into the wild, or perhaps this will result in a variation of ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Perhaps a rhetorical question, but in this case, given the ethical questions around Clearview&#8217;s activities, the question acquires a bit of irony. For those that haven&#8217;t heard of Clearview, they provide facial recognition capabilities for law enforcement. They also are very secretive with details about their tech and who they partner with. Well someone (or&hellip;<\/p>\n","protected":false},"author":1,"featured_media":4910,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,22,26],"tags":[],"class_list":["post-4909","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-ml","category-privacy","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/posts\/4909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/comments?post=4909"}],"version-history":[{"count":1,"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/posts\/4909\/revisions"}],"predecessor-version":[{"id":6631,"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/posts\/4909\/revisions\/6631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/media\/4910"}],"wp:attachment":[{"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/media?parent=4909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/categories?post=4909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nostatic.com\/lab\/wp-json\/wp\/v2\/tags?post=4909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}