{"id":10133,"date":"2015-10-09T09:00:24","date_gmt":"2015-10-09T13:00:24","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=10133"},"modified":"2017-09-24T08:13:19","modified_gmt":"2017-09-24T12:13:19","slug":"camouflaging-from-global-surveillance","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/camouflaging-from-global-surveillance\/10133\/","title":{"rendered":"Tips and Tricks to Hide from Big Brother&#8217;s Watchful Eye"},"content":{"rendered":"<p>As proven by Ed Snowden and Co., utopias are a myth. The anti-utopian storylines have been ingrained in our everyday lives. Technological progress brings a lot of magnificent things like <a href=\"https:\/\/www.kaspersky.com\/blog\/big-data-forensics\/8300\/\" target=\"_blank\" rel=\"noopener nofollow\">crime prevention<\/a> or solving a number of complicated <a href=\"https:\/\/www.kaspersky.com\/blog\/cool-big-data-projects\/8186\/\" target=\"_blank\" rel=\"noopener nofollow\">social and ecological challenges<\/a>; the same progress <a href=\"https:\/\/www.kaspersky.com\/blog\/scary-big-data\/9626\/\" target=\"_blank\" rel=\"noopener nofollow\">destroys individuals\u2019 privacy<\/a> at the grassroots level.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/10\/06024034\/anti-surveillance-FB.jpg\"><img decoding=\"async\" class=\"aligncenter wp-image-10134 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/10\/06024034\/anti-surveillance-FB.jpg\" alt=\"How to fool face recognition algorithm\" width=\"1600\" height=\"1600\"><\/a><\/p>\n<p>Technology also brings security on a new high-tech level. A system prescribes people\u2019s behavior everywhere, from shops to offices. You have rules and access permissions; don\u2019t even think of infringing them.<\/p>\n<p>But every action can lead to an opposite reaction. Hackers, common people who don\u2019t like being tracked and designers develop simple and geeky methods for those who want to keep something private. Let\u2019s see how you can fake a system out.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How to hide from surveillance cameras: the past and the future <a href=\"https:\/\/t.co\/nBvu6No0i7\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/nBvu6No0i7<\/a> <a href=\"http:\/\/t.co\/7BAirXhWpc\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/7BAirXhWpc<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/644872513953120256?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 18, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>Lift my eyelids or how to hide from video cams artistically<\/h3>\n<p>To oppose video surveillance <a href=\"http:\/\/cvdazzle.com\/\" target=\"_blank\" rel=\"noopener nofollow\">artists from the CV Dazzle project<\/a> created special makeup and haircuts, which disorient face recognition algorithms. Since this technology analyzes the way light and dark is distributed over your face (especially on chin, nose bridge, cheekbones, etc.). You can block detection by creating an \u201canti-face\u201d with the help of makeup and asymmetrical haircut.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Also in face rec tech piece: Adam Harvey's CVDazzle project which helps you hide from CCTV <a href=\"http:\/\/t.co\/e0sUH5y1Vu\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/e0sUH5y1Vu<\/a> <a href=\"http:\/\/t.co\/jpgsfIElM8\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/jpgsfIElM8<\/a><\/p>\n<p>\u2014 Creative Review (@CreativeReview) <a href=\"https:\/\/twitter.com\/CreativeReview\/status\/642280201104322560?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 11, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Face masks made by designer Zach Blas can serve you equally well at a BDSM party or Halloween celebration. The creator calls them the digital portraits of dehumanization, which apart from conceptual meaning also have practical appliance \u2014 the accessories can hide you from face recognition technology.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Fag Face: Biometrics disruption masks by Zach Blas. DFW FTW? <a href=\"http:\/\/t.co\/uSiPxlVst5\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/uSiPxlVst5<\/a><\/p>\n<p>\u2014 . (@LITFmag) <a href=\"https:\/\/twitter.com\/LITFmag\/status\/454933661909921792?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 12, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Such innovations are zany; they even work with cameras. But people around can notice you and remember because if such unusual camouflage. That\u2019s why you can probably use them at a costume party only.<\/p>\n<p><b>A fine dress helps to impress<\/b><\/p>\n<p>A very simple, almost classical way to hide from cameras is to put on black glasses and a hoodie. Stars and movie characters use this method, because it works.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/9VqcJCeIjK0?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>But don\u2019t let this basic style limit you, so let\u2019s look at some more serious garments. The Privacy Visor glasses, the brainchild of Japan National Institute of Informatics, can thwart face-recognition camera systems. <a href=\"http:\/\/www.pcworld.com\/article\/2969732\/privacy\/how-japans-privacy-visor-fools-facerecognition-cameras.html\" target=\"_blank\" rel=\"noopener nofollow\">They reflect overhead light into the camera lens<\/a>, causing the area around the eyes to appear much brighter than it normally does. Though people around can notice the unusual pattern on your eyeglasses, the technology develops rapidly and it\u2019s quite possible that this problem will be solved in the nearest future.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/HbXvZ1XKdWk?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>The textile industry also has what to offer to a newly born privacy fighter. If you want to wipe off your face from camera\u2019s viewfinder, you can do it right now \u2014 just put on a <a href=\"https:\/\/www.betabrand.com\/crowdfunding\/mens-reflective-flashback-hoodie-jacket.html\" target=\"_blank\" rel=\"noopener nofollow\">Flashback Photobomber Hoodie<\/a>. The garment\u2019s fabric is coated with gazillions of glass Nano spheres, which bounce off the flashlight. Reflected light overloads an image sensor of a camera and in the final image model\u2019s face becomes darkened.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Anti-paparazzi hoodie is a photobomber's dream: <a href=\"http:\/\/t.co\/ZAchNEtSPF\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/ZAchNEtSPF<\/a> <a href=\"http:\/\/t.co\/CCKmjTZHjC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/CCKmjTZHjC<\/a><\/p>\n<p>\u2014 Daily Dot Debug (@dotdebug) <a href=\"https:\/\/twitter.com\/dotdebug\/status\/573571748924424194?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">March 5, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>A smartphone is your second, unofficial ID. And of course it can be used to spy on you. The British company called The Affair created <a href=\"http:\/\/1984.the-affair.com\/\" target=\"_blank\" rel=\"noopener nofollow\">its special capsule collection<\/a> under impression of Orwell\u2019s \u20181984\u2019 novel.<\/p>\n<p>They say:<\/p>\n<p style=\"text-align: center\">BIG BROTHER IS WATCHING.<\/p>\n<p style=\"text-align: center\">HACKERS ARE PROWLING.<\/p>\n<p style=\"text-align: center\">It\u2019s time to fight back with stealth fashion.<\/p>\n<p>The Affair sells casual clothes with special pockets tailored from \u2018stealth fabric, which makes you both untrackable and unhackable\u2019. The company claims that this fabric can block RFID, GPS, Wi-Fi and Cell signals.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How do you make a completely anonymous phone call? It's harder than you think \u2013 <a href=\"http:\/\/t.co\/KZbvNxx7wz\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/KZbvNxx7wz<\/a> <a href=\"http:\/\/t.co\/oocb9LHjlp\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/oocb9LHjlp<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/585513680009359361?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 7, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As you can see, sci-fi inventions are not a fantasy anymore. Quite possible we\u2019ll see even more of new interesting creations during next few month. So stay tuned!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tips and methods of hacking global surveillance: makeup, special clothes, eyeglasses and more.<\/p>\n","protected":false},"author":522,"featured_media":10135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1788,1789],"tags":[1026,1126,191,1280,78,423,43,192,97],"class_list":{"0":"post-10133","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-technology","10":"tag-analytics","11":"tag-cameras","12":"tag-data","13":"tag-face-detection","14":"tag-hackers","15":"tag-mobile-devices","16":"tag-privacy","17":"tag-protection","18":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/camouflaging-from-global-surveillance\/10133\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/camouflaging-from-global-surveillance\/5093\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/camouflaging-from-global-surveillance\/6128\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/camouflaging-from-global-surveillance\/6319\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/camouflaging-from-global-surveillance\/7075\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/camouflaging-from-global-surveillance\/6729\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/camouflaging-from-global-surveillance\/9218\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/camouflaging-from-global-surveillance\/6260\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/camouflaging-from-global-surveillance\/9138\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/camouflaging-from-global-surveillance\/9218\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/camouflaging-from-global-surveillance\/10133\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/camouflaging-from-global-surveillance\/10133\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/analytics\/","name":"analytics"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10133"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10133\/revisions"}],"predecessor-version":[{"id":19306,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10133\/revisions\/19306"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10135"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}