Clearview AI source code exposed in major security lapse
Security firm uncovers controversial startup’s sensitive inner workings
A security firm uncovered an exposed server containing the source code to the company’s entire facial-recognition database, including the secret keys and credentials that allowed users access cloud storage containing copies of its Windows, Mac, Android and iOS apps.
Slack tokens were also accessible, which could grant hackers access to the company’s internal communications.
Chief security officer at cybersecurity firm SpiderSilk, Mossab Hussein, discovered the exposed server and also found the source code had been configured to allow anyone to register as a new user and log in to the platform.
Hoan Ton-That, CEO and co-founder of Clearview AI, responded to the cybersecurity lapse, saying that it “did not expose any personally identifiable information, search history, or biometric identifiers.”
He added that the company has “done a full forensic audit of the host to confirm no other unauthorized access occurred.” Ton-That also shared the company changed the secret keys exposed by the server, rendering them useless.
Clearview AI first made headlines when a New York Times exposé detailed the companies massive facial-recognition database, which consists of billions upon billions of images scraped from a long list of websites and social media platforms. By uploading a person’s photo, Clearview AI’s software will attempt to match it with any similar images within its database.
Since revealing the inner workings of its platform, Clearview AI has been forced to defend itself numerous times, insisting its software is available to law enforcement agencies only. Whether or not law enforcement agencies are the only ones with access to this platform remains unknown, as many claim Clearview has marketed its product to retail heavyweights, including Macy’s and Best Buy.
With poor cybersecurity practices like these, Clearview AI is obviously not doing nearly enough to prevent this powerful tool from falling into the wrong hands.
Next-generation time series: Forecasting for the real world, not the ideal world
Solve time series problems with AIFree download
The future of productivity
Driving your business forward with Microsoft Office 365Free download
How to plan for endpoint security against ever-evolving cyber threats
Safeguard your devices, data, and reputationFree download
A quantitative comparison of UPS monitoring and servicing approaches across edge environments
Effective UPS fleet managementFree download