Disneyland Now Uses Face Recognition on Visitors
Disneyland Now Uses Face Recognition on Visitors
迪士尼现已在游客中启用人脸识别技术
Disneyland Rolls Out Face Recognition
迪士尼乐园推出人脸识别系统
The Happiest Place on Earth just got a bit creepier. The Walt Disney Company announced this week that visitors to its Disneyland Park and Disney California Adventure Park will have the option to “choose” to enter the park through a lane that’s equipped with face recognition technology. While the company says subjecting yourself to face recognition is “entirely optional,” it notes that “you may still have your image taken” if you enter the parks through lanes without face recognition systems. “地球上最快乐的地方”现在变得有些令人毛骨悚然了。华特迪士尼公司本周宣布,前往迪士尼乐园(Disneyland Park)和迪士尼加州冒险乐园(Disney California Adventure Park)的游客将可以选择通过配备人脸识别技术的通道入园。虽然该公司表示,是否接受人脸识别是“完全自愿的”,但它同时也指出,如果你选择通过没有配备人脸识别系统的通道入园,“你的图像仍可能被拍摄”。
Disney’s face recognition, like many others, works by converting images of people’s faces into a numerical value, which can then be used to match faces in other images. The company says these numerical values will be deleted after 30 days, “except in cases where data must be maintained for legal or fraud-prevention purposes.” 迪士尼的人脸识别技术与许多其他同类技术一样,通过将人脸图像转换为数值,进而用于匹配其他图像中的人脸。该公司表示,这些数值将在30天后删除,“除非在法律或防欺诈目的需要保留数据的情况下”。
Face recognition systems are widely used across the United States and the world. Law enforcement agencies frequently use the technology, but it has also proliferated into everyday aspects of life, from airports to MLB and NFL stadiums to Madison Square Garden. 人脸识别系统在美国乃至全球范围内已被广泛使用。执法机构经常使用这项技术,但它也已渗透到日常生活的方方面面,从机场到美国职业棒球大联盟(MLB)和国家橄榄球联盟(NFL)的体育场,再到麦迪逊广场花园,随处可见。
The NSA Is Testing Out Anthropic’s Mythos AI Tool for Discovering Hackable Bugs
美国国家安全局(NSA)正在测试 Anthropic 的 Mythos AI 工具以发现可利用漏洞
Anthropic’s Mythos Preview AI model has been described as so adept at digging up hackable bugs in software that its use has so far been carefully restricted to prevent it from falling into the hands of malicious hackers. So perhaps it would be more of a surprise if the National Security Agency was not already trying it out. Anthropic 的 Mythos Preview AI 模型被描述为极其擅长挖掘软件中的可利用漏洞,以至于其使用目前受到严格限制,以防止落入恶意黑客手中。因此,如果美国国家安全局(NSA)还没有开始尝试使用它,那反而更令人惊讶。
Bloomberg News and Axios reported this week that the NSA was among the agencies and companies granted early access to Mythos, which has been limited to 40 organizations so far, according to Axios. The agency has used the tool to hunt for bugs in Microsoft’s software—naturally, given that it still runs on the majority of the world’s PCs—and has been impressed with its speed and effectiveness in finding exploitable vulnerabilities, according to sources who spoke anonymously to Bloomberg. 据彭博社和 Axios 本周报道,NSA 是获得 Mythos 早期访问权限的机构和公司之一。据 Axios 称,目前该工具仅限 40 家机构使用。据匿名向彭博社透露的消息人士称,NSA 一直在使用该工具搜寻微软软件中的漏洞——考虑到微软软件仍运行在全球大多数个人电脑上,这并不奇怪——并且对该工具在发现可利用漏洞方面的速度和有效性印象深刻。
The agency’s remit, after all, includes some elements of helping the US government discover and patch security vulnerabilities in the software it uses, as well as sometimes exploiting those vulnerabilities in the NSA’s own operations. 毕竟,该机构的职责包括协助美国政府发现并修补其所用软件中的安全漏洞,有时也包括在 NSA 自身的行动中利用这些漏洞。
The NSA’s testing or adoption of Anthropic’s AI tool appears to have proceeded in spite of the Department of Defense’s declared ban on Anthropic, which followed Defense secretary Pete Hegseth’s claim that the company represented a supply chain risk. Hegseth said in February, however, that the DOD will transition away from Anthropic’s tools over six months, and Anthropic has sued to prevent the ban from being enacted. 尽管美国国防部(DOD)宣布禁止使用 Anthropic 的产品(此前国防部长皮特·赫格塞斯声称该公司存在供应链风险),但 NSA 对 Anthropic AI 工具的测试或采用似乎仍在进行。然而,赫格塞斯在二月份表示,国防部将在六个月内逐步停止使用 Anthropic 的工具,而 Anthropic 已提起诉讼以阻止该禁令的实施。
Given that the NSA is part of the DOD, it’s not clear for now whether the NSA is merely using Mythos in the window before the ban goes into effect, or if the tool is powerful enough to persuade the NSA to rethink its ban—or make an exception. 鉴于 NSA 隶属于国防部,目前尚不清楚 NSA 仅仅是在禁令生效前的窗口期内使用 Mythos,还是该工具的强大功能足以说服 NSA 重新考虑其禁令,或者为其破例。
19-Year-Old Alleged Member of Scattered Spider Ransomware Group Arrested
勒索软件组织 Scattered Spider 的一名 19 岁涉嫌成员被捕
The ransomware group known as Scattered Spider has been responsible for some of the most damaging extortion-focused hacking campaigns in recent memory, including the breaches of MGM Resorts, Caesars Entertainment, and retailers like M&S and Harrods. It’s also distinguished among ransomware gangs for its membership: Often very young, English-speaking hackers based in countries who are cooperative with US law enforcement—and, therefore, tend to get arrested. 被称为 Scattered Spider 的勒索软件组织对近期一些最具破坏性的勒索黑客行动负责,包括对米高梅度假村(MGM Resorts)、凯撒娱乐(Caesars Entertainment)以及玛莎百货(M&S)和哈罗德百货(Harrods)等零售商的入侵。该组织在勒索软件团伙中也因其成员构成而与众不同:成员通常是非常年轻、讲英语的黑客,居住在与美国执法部门合作的国家,因此往往容易被捕。
The latest alleged member of the group to be identified and charged is 19-year-old Peter Stokes, who was arrested at an airport in Finland, where he intended to board a flight to Japan. According to the Chicago Tribune, Stokes’ alleged involvement in the targeting of four Scattered Spider victim companies is described in a criminal complaint that has since been placed under seal. 该组织最新被确认身份并受到指控的成员是 19 岁的彼得·斯托克斯(Peter Stokes),他在芬兰机场被捕,当时他正准备搭乘飞往日本的航班。据《芝加哥论坛报》报道,斯托克斯涉嫌参与针对四家 Scattered Spider 受害公司的攻击,相关指控记录在一份已被封存的刑事诉状中。
Stokes is reportedly accused of helping to steal millions from those unidentified victim companies, which included an online communications platform and a luxury retailer. According to the complaint, he also led a jet-set life, traveling from Dubai to Thailand to New York and appearing in one photo wearing a diamond-studded necklace that read “HACK THE PLANET.” 据报道,斯托克斯被指控帮助从这些未公开的受害公司窃取了数百万美元,其中包括一个在线通信平台和一家奢侈品零售商。根据诉状,他还过着奢华的“喷气式”生活,从迪拜到泰国再到纽约四处旅行,并在一张照片中佩戴着一条镶满钻石的项链,上面写着“黑掉地球”(HACK THE PLANET)。