That grim outlook led me to do some research. Did you know about #ComputerVisionDazzle or "CV dazzle" in short? Well, I didn't, but maybe, in these times, this is something worth looking into. It's not exactly new (dating back over ten years to 2010) and is used ever since to avoid #FacialRecognition:

https://www.dazeddigital.com/beauty/article/68619/1/how-effective-is-anti-face-make-up-to-evade-ai-surveillance

#DazedDigital #AdamHarvey #privacy #digitalPrivacy #anonymity #digitalAnonymity #TheDazzleClub #DavidNoever #GaitRecognition #MichelleTylicki

Can anti-face make-up help you evade AI surveillance?

Years after ‘CV dazzle’ first came onto the scene, the use of facial recognition software like Clearview AI against protesters has sparked a renewed interest in anti-surveillance makeup – but how does it hold up against new technology?

Dazed

Think of online anonymity as being one person in a vast crowd. Every piece of personal information you reveal reduces the size of that crowd, the group of people you could plausibly be. For example, revealing your gender cuts the number of potential identities roughly in half.

One way to regain some anonymity is through deliberate disinformation. Suppose you share \(n\) independent yes/no facts about yourself, but intentionally flip \(k\) of them (without the attacker knowing which). In that case, you increase the number of identities consistent with your answers by a factor of \(C(n,k)\).

#OnlinePrivacy #DigitalAnonymity #InformationSecurity #CyberAwareness #PrivacyMatters #DigitalFootprint #DataProtection #InformationTheory #Anonymity #PrivacyEngineering #DataAnonymization #Disinformation #Combinatorics #SecurityResearch #ThinkBeforeYouShare #OnlineIdentity #PrivacyByDesign #DigitalEthics #ProtectYourData #InternetSafety #Privacy #CyberSecurity #Infosec #DataPrivacy #OnlineSafety #SecurityMindset

. Its decentralized, peer-to-peer structure makes it nearly impossible to shut down—but that same anonymity fuels cybercrime. Cryptocurrencies like Bitcoin thrive here, blending privacy with ethical dilemmas. The Dark Web is a digital paradox: a tool for freedom and a haven for crime. How do we balance its power and risks? #DarkWeb #CyberSecurity #PrivacyMatters #TechSecrets #DigitalAnonymity #InternetFreedom (2/2)
. This dual nature—shielding both illicit activities and free speech—makes it one of the most fascinating and controversial tech stories today. #DarkWeb #TechSecrets #CyberSecurity #PrivacyMatters #InternetFacts #DigitalAnonymity (2/2)

🎧 New podcast clip:
The “veil of anonymity” is not just a phrase. Some predators build entire systems of deception online. Dr. Michael Nuccitelli explains how.

🎧 Listen: https://youtu.be/s2M4e4du3S4

#TheInternetIsCrack #Podcast #iPredator #OnlineSafety #DigitalAnonymity #Cyberpsychology #TrollCulture

Living in a world of "colorfulness" and "uniqueness."
Yet all wear the same mask.
Be the exception.

#Cybersecurity #DigitalAnonymity #DeadSwitch #GhostProtocol #SignalNotNoise #BeTheException #PrivacyMatters

DeadSwitch Protocol – Dynamic Masking: Evading the Digital Net

To survive in hostile systems, DeadSwitch changes shape. Modern surveillance doesn’t need a name – it needs a fingerprint.Your MAC address, screen resolution, browser quirks, fonts – al…

Tom's IT Cafe
DeadSwitch Protocol – Silent Vault: Protecting What the World Cannot Reach

In cybersecurity, survival is decided long before the first attack.The strongest walls are not digital – they are physical.DeadSwitch operates where networks end: inside the Silent Vault.

Tom's IT Cafe
Your TOTP is Not a Second Factor :: If You Store It Wrong

By DeadSwitch You think you have 2FA? You think you’re safe because your logins need a second factor? Then you go and store your TOTP codes in the same password manager that holds your passwo…

Tom's IT Cafe
The Android Phone: Three OPSEC Levels to Disappear Into the Shadows

In a world where our every move is tracked and our data is a commodity, the device in your pocket—your Android phone—becomes both a tool and a potential liability. Whether you’re a casual user or a…

Tom's IT Cafe