Privacy: Can You Trust FaceApp With Your Face?

FaceApp is an app that can edit photos of people's faces to show younger or older versions of themselves.  The fashionable smartphone software used to simulate the effects of ageing on its users' features is at the centre of a global cybersecurity row with majors concerns expressed over its terms and conditions. 

Thousands of people are sharing the results of their own experiments with the app on social media. While such clauses are not dissimilar to those used by other social media firms, the company’s Russian background stoked fears it could be vulnerable to abuse. 

They argue that the company takes a cavalier approach to users' data - but FaceApp said in a statement most images were deleted from its servers within 48 hours of being uploaded. The company also said it only ever uploaded photos that users selected for editing and not additional images.

What is FaceApp?
FaceApp is not new. It first hit the headlines two years ago with its "ethnicity filters". These  transform faces of one ethnicity into another - a feature that sparked a backlash and was soon dropped. The app can, however, turn blank or grumpy expressions into smiling one and it can manipulate styles of make-up. This is done with the help of artificial intelligence (AI). An algorithm takes the input picture of your face and adjusts it based on other imagery.

So what's the problem?
Eyebrows were raised lately when app developer Joshua Nozzi tweeted that FaceApp was uploading troves of photos from people's smartphones without asking permission, however, a French cyber-security researcher who uses the pseudonym Elliot Alderson investigated Mr Nozzi's claims , finding that no such bulk uploading was going on - FaceApp was only taking the specific photos users decided to submit. FaceApp confirmed to BBC reporters that only the user-submitted photo is uploaded.

Other researchers have speculated that FaceApp may use data gathered from user photos to train facial recognition algorithms. This can be done even after the photos themselves are deleted because measurements of features on a person's face can be extracted and used for such purposes. Some question why FaceApp needs to upload photos at all when the app could in theory just process images locally on smartphones rather than send them to the cloud.

In FaceApp's case, the server that stores user photos is located in the US. FaceApp itself is a Russian company with offices in St Petersburg. From a business perspective, hiding the photo processing code in their server makes it hard for potential competitors from copying. It also makes piracy harder

Before using FaceApp for taking our photos of your own, its worth reading FaceApp's privacy policy which suggests some user data may be tracked for the purposes of targeting ads. The app also embeds Google Admob, which serves Google ads to users.

FaceApp's CEO, Yaroslav Goncharov told the BBC that  terms in FaceApp's privacy policy were generic and denies that the company shares any data for ad-targeting purposes, as the business model is to make money from paid subscriptions for premium features.

What else does FaceApp have to say?
Mr Goncharov shared a company statement that said FaceApp only uploads photos selected by users for editing. "We never transfer any other images," he said in a  statement.

"We might store an uploaded photo in the cloud....The main reason for that is performance and traffic: we want to make sure that the user doesn't upload the photo repeatedly for every edit operation....Most images are deleted from our servers within 48 hours from the upload date."

The statement said that while FaceApp accepts requests from users to have their data deleted, the company's support team was currently "overloaded". FaceApp advises users to submit such requests through settings, support, "report a bug" and add "privacy" in the subject line. User data was not transferred to Russia, the statement added.

The UK's Information Commissioner's Office (ICO) told BBC News it was aware of stories raising concerns about FaceApp and that it would be considering them.

"We would advise people signing up to any app to check what will happen to their personal information and not to provide any personal details until they are clear about how they will be used," a spokeswoman for the ICO said.

BBC:       Telegraph:        CNET:

You Might Also Read: 

Limit The Duration Google Holds Your Data:

Get Ready For ePrivacy Regulation:

 

 

« Russian FSB Hacked: "Largest data breach in its history"
Business Leaders Are Ignoring Cyber Risks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

IT2Trust

IT2Trust

IT2Trust is one of Scandinavia’s leading value-added distributors of business-critical IT solutions within IT security and networking.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Picnic

Picnic

Picnic is a gritty, pioneering team of intelligence and cybersecurity specialists focused on solving the security challenge of our time - social engineering.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.