Dialogue about identification

— Cars will learn to recognize people by their faces.

“I don’t even know how to approach the task of face recognition, even though I’m not a specialist.”

— Not “facial recognition,” but rather recognizing people. This is necessary so that we don’t depend on identifiers that can be lost, leaving us with nothing. It’s needed for making purchases. We don’t even need to approach the issue of moving away from cash. It will somehow work itself out. Right now, it’s just that… not profitable to the ruling class.

“I think the accuracy of recognition will be proportional to the accuracy of tracking, which won’t be 100% even without any malicious intent.”Текст для перевода: ..

— Tracking doesn’t have to be 100% accurate; it’s probabilistic. Just like our human system of recognizing each other. We assess several factors at once: clothing, gait, face, hair, glasses, manners, speech, the likelihood of that person being in that place… For example, try to quickly recognize your doctor when they’re not in a lab coat, or how many times will you wonder if someone is a classmate when you see a familiar face at an airport on another continent? 🙂

— That’s the problem. I don’t go to the airport often, but when I do, I’m not dressed like I usually am, and I’ve even shaved and styled my hair. Plus, I’ve tanned and lost weight after traveling in Nigeria for two years.
Here I am back home — how will the system recognize me? What will the gateway look like between a country with the system and one without it? How will it look between the taiga (and other areas that will undoubtedly exist) and the city?

— Well, it’s all very simple here. For example, the system can already recognize faces even with camouflage (fake mustaches, beards), there’s remote fingerprint scanning, and you can analyze a person’s gait, voice tone, and even their eyes. Projects for total identification based on iris recognition and tracking people within cities are already being implemented. The most interesting part is that even if you’re not recognized immediately, the system will say to itself, “Semyon Semyonovich!” and slap itself on the forehead, looking at who you’re calling on the phone, what address you’re heading to, who’s meeting you, and so on. The algorithms of the system should be designed to identify an object not from the entire dataset but from a probable one, for example, narrowing down the search for the identifiable person among relatives or those who are meeting them. Or among those who bought a round-trip plane ticket, even back in their homeland, or simply from a list of passengers registered for the flight.

The gateway will look like this: No one will put any pressure on anyone. Neither their own nor strangers. Your own will be recognized immediately (in 99.99% of cases) or shortly after. Strangers will be identified and tracked, becoming “one of their own” for the next tracking node, which will have information from the previous one. If we’re talking about the taiga, the last post will know that “a person has exited.” Moreover, it’s worth constantly polling the network to see if they’ve “come back,” just out of concern for someone who has gone into the taiga. And when someone comes out of the taiga, they will be recognized from that limited list of those who went in, first and foremost. An unidentified “stranger” coming from the taiga (or disembarking from a plane) will instantly acquire a “file” on themselves, and everyone will have access to that person’s history from the moment they “came out of the woods.” Of course, such a “stranger,” with a shallow history, will be a thorn in everyone’s side. Spies wouldn’t find this suitable. Moreover, they won’t have any money, nor will there be anyone waiting for them or who could be waiting for them — none. They won’t even be able to catch a bus 🙂 And if they want money — they’ll have to go through customs, exchange currency, show who they are (passport), and God forbid they show a different passport next time 🙂 Besides, there’s no need to “specifically” exchange currency. Credit cards are sufficient to identify people, and at the first “exchange kiosk,” they’ll get all the money they want to spend credited to their account. The system is already tracking them and recognizing them, constantly accumulating new data about them. So, no one will specifically ask for fingerprints or a voice sample. They will end up in the system sooner or later anyway. Just look at that. description 🙂.

– Biometric systems have seriously discredited themselves. Even modern DNA analysis can be faked. Now, let’s consider a person without a recent history, essentially a blank slate. In that case, their identification relies on percentages. At some percentage level, the system won’t recognize them, and they will be left without resources. For an airport or even in the wilderness, this can be resolved officially with a passport. But I am sure there will be micro-blanks within the system, including artificial ones. If a lot of people fall into such a blank, many unknowns will emerge from it, and more than half of them will be sent for identification by the system. Plus, there’s also the laundering of stolen goods in these blanks.

— 1. Of course, it discredited it, since “DNA analysis” is a document. The question is that any system that requires documents is inherently vulnerable.

2. It’s his concern to be recognized. 🙂 At the very least, he will be recognized by the other parts of the system just as the girl at the ticket counter recognizes him now, glancing up at the customer once a second to make sure it’s the same person in front of her. The face, the clothes, the voice. (By the way, experiments have shown that a cashier, unlike a machine, doesn’t notice a switch—an abrupt change of customer, if it’s organized.) And as a reasonable maximum—his flight history and boarding pass with his name, fingerprints scanned remotely, scent, gait.

3. With the passport, we can’t tell if it’s really that person or just someone with some documents.

4. The question is that such a system can only be organized after the corresponding infrastructure has developed—widespread surveillance cameras, recognition systems, analytical video systems, and so on. Just as the internet could not have started to exist without the country being wired for telephony. And the “coverage map” is really a very simple technical issue. Mobile operators solve it within a year. In theory, the system should simply track who entered a specific area and compare that with those who exited. They can all be easily identified. It’s really not a problem. In any case, they will be recognized, and their history will be associated with the corresponding “file” after the first phone call or the first purchase of a product or anything else that requires or provides the opportunity for thorough identification.

5. Stolen goods need to be delivered to a spot without being recognized. Stealing in the “shadows” will be possible, and people will independently “connect” their possessions to the overall system specifically to ensure their own safety.

Leave a Reply

Your email address will not be published. Required fields are marked *