Sucking Dox: Facial Recognition Software Used To Harass Porn Stars' Real Identities

Facial recognition software has long been touted as a necessary aide to combat crimes, from street-level surveillance up to complex police analysis of individuals' tattoos for identification.  Now, a piece of software that allows you to search for faces as easily as one might search for a cupcake recipe has backfired to those who don't really want to be identified...well, for their facial features, at least.


They sell their bodies for a living, which enrages those who'd never get a buyer,
or any kind of lover at all.
(Image courtesy monsters4ever.com.)



According to Global Voices Advox, the new FindFace software was developed as a comprehensive means of facilitating communication between parties who may have met (or at least noticed) each other, but were unable to trade names and/or other social media handles.  While the base notion behind FindFace does seem like a temptation for the less scrupulous to start rocking their stalking skills, no one guessed it'd prove as devastating to certain parties as it has.

We'll give you a hint:  it's not hurting well-to-do businessmen.
(Image courtesy limpehft.blogspot.com.)

After a young artist brought about attention to the service by photographing strangers on the St. Petersburg subway and matching their faces to their Vkontakte (Russian Facebook) pages, the Russian version of 4chan (known as Dvach - "2chan") decided to de-anonymize a few of their favorite faces.

Of course, because the internet is merciless and surveillance technology is a Pandora's Box that will propel pervasive promiscuity whenever permitted, these faces belonged to porn stars.


Nice job, weirdos, now nobody will want to have their facial images searched
by prospective lovers who spotted them from afar in a crowd
or some other romantic shit like that.
(Image courtesy advox.globalvoices.org.)


The women subjected to the FindFace frenzy then had their Vkontakte pages spammed from "admirers", as well as having their family members and friends messaged and dragged into the raunchy reveal.  Women who offered services via the prostitution website Intimcity were also outed regarding their activities.

Unfortunately, the doxxers who conducted the lack-of-panties raid were not doing so in celebration of the female form, rather, their attack was a highly modern method of slut-shaming.  Possibly because people with that much extra time on their hands aren't spending it wooing women, or even making enough money to afford to pretend a prostitute would care about them.

Neckbeards.  Damn those disgusting neckbeards.
(Image courtesy makeagif.com.)

FaceFind founder Maxim Perlin made sure that Vkontakte removed a private group of users who shared screencaps of their exploits (preserved in case any of their targets' pages were taken down), and has reminded any unscrupulous users that distributing pornography illegally is a felony in Russia.

“We are making every effort to protect all Vkontakte users from potential malicious acts,” Perlin said. ”And we’re prepared, if necessary, to provide any information needed to find the users responsible for this harassment.”


Until the issue is resolved, a lot of Russian porn might start looking like this.
(Image courtesy sex.com.)



56 comments:

  1. Nice blog and this information are good for all we are geeks per hour review also give this type of services. For more information visit my site: - geeksperhour review

    ReplyDelete
    Replies
    1. IEEE Final Year projects Project Centers in India are consistently sought after. Final Year Students Projects take a shot at them to improve their aptitudes, while specialists like the enjoyment in interfering with innovation. A IEEE Domain project Final Year Projects for CSE system development life cycle is essentially a phased project model that defines the organizational constraints of a large-scale systems project.

      IT Company Employess Productivity usually increases when a company implements corporate training courses on latest technologies.
      corporate training in chennai
      It Companies need of Corporate training programme arises due to improvement in technology, need for getting better performance or as part of professional development. corporate training companies in chennai Corporate Training refers to a system of professional development activities provided to educate employees.
      corporate training companies in india




      Great Article


      Digital Marketing Company in Chennai


      SEO Company in India

      Digital Marketing Agency

      SEO Services in India

      Delete
  2. Hi,
    This blog is good and informative as well. You have shared something new which is good.
    (http://www.hifreelancer.com)

    ReplyDelete
  3. Unlike additional blogs I have read which are really not tht good.
    carding forum

    ReplyDelete
  4. This is very educational content and written well for a change. It's nice to see that some people still understand how to write a quality post! code fibo scam

    ReplyDelete
  5. It would appear that the writer has put an impressive measure of determined work into this.
    money making machine

    ReplyDelete
  6. This comment has been removed by the author.

    ReplyDelete
  7. This comment has been removed by the author.

    ReplyDelete
  8. What a slick and exact article. The utilization of words is exemplary.
    software development company in delhi

    ReplyDelete
  9. Well Written and Structured Blog. Totally a fan of your writing, I found this blog unique and i have been going through the posts in your blog.
    Short Independence Day Quotes in Malayalam 2018

    ReplyDelete
  10. When the addict is acting out, he has feelings of being disconnected from himself and his environment. Clients speak of "the bubble", the "erotic haze", "zoning out", and "feeling apart from myself and watching myself from afar ", of feeling "foggy" or "not feeling like a real person" Losing track of time is common as is feeling outside oneself as both an observer and a participant.Porn

    ReplyDelete
  11. Most of us probably went through a breakup and know what impact has on you losing somebody you love. After a breakup, men find it difficult to approach women face to face. It is normal to feel down but there are solutions, you just have to do something about it. Visit here for solution หนังโป๊.

    ReplyDelete
  12. Great write-up, I am a big believer in commenting on blogs to inform the blog writers know that they’ve added something worthwhile to the world wide web!. xxx

    ReplyDelete
  13. Different timetable perspectives: every day, week by week, by name, administration, sexual orientation and then some. Winged animals eye perspectives of your timetable can be extremely helpful when taking a gander at the 10,000 foot view. customer onboarding software

    ReplyDelete
  14. Intriguing post. I Have Been pondering about this issue, so much obliged for posting. Really cool post.It "s truly extremely pleasant and Useful post.Thanks Techalook

    ReplyDelete
  15. Most of the time I don’t make comments on websites, but I'd like to say that this article really forced me to do so. Really nice post! it support in london

    ReplyDelete
  16. The blog writings were so nice, I wished they neever ended.
    custom software development company

    ReplyDelete
  17. Best SSC Coaching Centers in Bangalore
    http://www.globalias.in/ssc-coaching-in-bangalore/

    ReplyDelete
  18. Fascinatingly composed,Totally in wonder of the article.
    facial SG

    ReplyDelete
  19. Despite the fact that delivery expenses can build the expense of numerous items bought through electronic business and add considerably to the last value, appropriation costs are essentially diminished for computerized items, for example, budgetary administrations, programming, and travel, which are critical online business fragments. Angular testing services Angular testing

    ReplyDelete
  20. Try and ensure that the software testers at least hold these certifications at foundation level. Another factor with regards to software testers is the amount of experience they have. Many software testing companies state that there testers have five years I.T.https://www.dbdesigner.net

    ReplyDelete
  21. This article is very informative. Learn more about vampire facial

    ReplyDelete
  22. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. mytecheytricks.simplesite.com

    ReplyDelete
  23. Without a doubt, an accurately picked ERP arrangement takes care of the issues of separated and divided software forms by making a reasonable, effective, and dependable software condition with huge advantages. https://www.techpally.com/convert-pdf-file-to-word/

    ReplyDelete
  24. This comment has been removed by the author.

    ReplyDelete

  25. Great content. This was really a valuable experience. I will ensure that my friends also read this as soon as possible. I cannot wait to share this.

    ReplyDelete
  26. cool stuff you have got and you keep update all of us. xxx porn videos

    ReplyDelete
  27. I conceive you have noted some very interesting details , appreciate it for the post. macbook mockup

    ReplyDelete
  28. Very informative and great complex body part of articles , now that’s user pleasant (:. device mockup

    ReplyDelete
  29. I am really loving the theme/design of your web site. Do you ever run into any browser compatibility problems? A few of my blog readers have complained about my website not working correctly in Explorer but looks great in Chrome. Do you have any tips to help fix this issue? phone mockup

    ReplyDelete
  30. I recently came across your blog and have been reading along. I thought I would leave my first comment. I don't know what to say except that I have enjoyed reading. Nice blog. I will keep visiting this blog very often. Porno18: Секс 2020 года

    ReplyDelete
  31. Numerous organizations list a technology as one of their upper hands. Is this substantial? Now and again indeed, yet In many cases no.
    best streaming microphone

    ReplyDelete
  32. Software applications are required for empowering simple access to site, exploring through the webpage, getting required subtleties, choosing the correct item or administration varying, paying on the web in a safe way and staying in contact with the site reliably from there on for future needs and so on. IOS system

    ReplyDelete
  33. Hey to everyone, it’s my first visit of the blog site; this blog includes awesome and actually best info for the visitors.
    Sex Dating

    ReplyDelete
  34. I really appreciate the kind of topics you post here. Thanks for sharing us a great information that is actually helpful. Good day! free porn webcams

    ReplyDelete
  35. Wow! Such an amazing and helpful post this is. I really really love it. It's so good and so awesome. I am just amazed. I hope that you continue to do your work like this in the future also Amateur Black Onlyfans Girl Nude

    ReplyDelete
  36. Just pure brilliance from you here. I have never expected something less than this from you and you have not disappointed me at all. I suppose you will keep the quality work going on. 亚博

    ReplyDelete
  37. The overall performance of most stock cars with stock engines is usually best when using stock converters. Minor changes in camshafts that push the power range up in RPM may require a different converter. If you find yourself in this situation, you will need to buy a new one. Here are steps to follow when trying to select a converter for your vehicle: Mp3 youtube

    ReplyDelete
  38. Software License Protection is means the security solution where software developers use to integrate into their software applications with the intention to prevent unauthorized usage or illegal execution of their software. Software developers can either purchase Software License Protection solutions from third party solution providers or develop it in-house. software development

    ReplyDelete
  39. Software License Protection is means the security solution where software developers use to integrate into their software applications with the intention to prevent unauthorized usage or illegal execution of their software. Software developers can either purchase Software License Protection solutions from third party solution providers or develop it in-house. download HyFy pc version

    ReplyDelete
  40. If a computer system is infected with spyware, it is very hard to detect the same, but with the wide availability of so many advanced spyware removal programs, it has become now much easier to protect your PC from the harmful and irradiating effect of spyware. However, it is recommended not to go for the free spyware removal programs unless you are sure that the website offering the same is a legitimate and established one, such as Google, McAfee, Microsoft, etc. Hack a Phone in Singapore

    ReplyDelete
  41. I like your post. It is good to see you verbalize from the heart and clarity on this important subject can be easily observed... silicone love doll

    ReplyDelete
  42. It was wondering if I could use this write-up on my other website, I will link it back to your website though.Great Thanks. AOL Search Engine Scraper and Email Extractor by Creative Bear Tech

    ReplyDelete
  43. Thank you for this fascinating post, I am happy I observed this website on Google. Not just content, in fact, the whole site is fantastic.bookpublishingsoftware

    ReplyDelete
  44. This particular papers fabulous, and My spouse and i enjoy each of the perform that you have placed into this. I’m sure that you will be making a really useful place. I has been additionally pleased. Good perform! Email Scraper

    ReplyDelete
  45. Likewise, they must perform sanity testing to ensure that the software is functioning according to predefined requirements. Agile methodology reedratings further requires enterprises to unify software development and testing activities to deliver high quality software applications.

    ReplyDelete
  46. Nice post mate, keep up the great work, just shared this with my friendz Virtual Furniture

    ReplyDelete
  47. Some time prior I worked with a HijackThis log from somebody battling with irritating site diverts and Google cautioning him about being contaminated with spyware. couple seeking men

    ReplyDelete