Meta have been asking some users to confirm their identity with a 'video selfie', & for supposed account recovery. Soon, more users will be asked with threat of blocking or deleting their account as Meta prepares to launch their facial recog glasses (soon on shelves).

But it's not just about feeding their new product. Meta are harvesting biometric data on a vast scale, perhaps globally, & in full cohort with a dangerous regime.

Leaving Meta is an important act of resistance, now more than ever

FWIW I have never had a Facebook nor Instagram account, but can only guess how much of a sacrifice it is to leave all those connections behind, especially for heavy users. But the fact these platform giants use our conversations and expressions as an implement of blackmail - threatening to delete it all - shows very clearly they are no better than a shitty landlord. It is an act of care for community and self to stop feeding such toxicity. Stop paying rent.

Worth mentioning that if I can get hold of a pair of Meta's new face recog RayBan glasses I will study them with the aim to detect and hopefully disable them at a distance.

I did the same for Google Glass (covered by Wired, Hackaday, Time) back in the day. I named it Glasshole.sh.

https://julianoliver.com/projects/glasshole/

The working title for my future Meta RayBan blocker is BanRay.sh

glasshole.sh

@JulianOliver wish you could kick them off all networks or actually disable them…
@mirabilos in fact that is what my automated Glasshole.sh did, so far as detecting them, the networks they were connected to, and then deauthing them to break that connection. Some old code is on GitHub, in the 'Cyborg Unplug' project, for running on tiny embedded boards. Will resuscitate for this Meta thing. I ceased using GitHub when bought by MS, so no updates in forever.
@JulianOliver no, it just deauths them from one network, but they can just connect to another.
@JulianOliver or even just reconnect.
@mirabilos It worked very well with the automated Glasshole, and the two models I tried. It worked well for some other users too, also with quadcopters and WiFi cameras disguised as other things, like smoke detectors. As the detector script in the Unplug code shows, it continuously detects and deauths, so the target device has no functioning connection.
GitHub - CyborgUnplug/CyborgUnplug: Cyborg Unplug firmware files

Cyborg Unplug firmware files. Contribute to CyborgUnplug/CyborgUnplug development by creating an account on GitHub.

GitHub
@JulianOliver not to the one WLAN network you run it on, but perhaps to others.
@mirabilos In fact it scans all networks on L2, finds the one any member of the target MAC array is associated with, assumes the BSSID of the AP, sends deauth packets to the client (glasses), which it automatically abides as a function of the 802.11 spec built-in. It does this in a loop. With more NICs to put in Monitor mode, you have effective detect and deauth 'threads' in parallel.
@JulianOliver ah. That will help a bit more, indeed.