Toggle light / dark theme

Digital identity capabilities from Trust Stamp are now being integrated with Mastercard’s Wellness Pass solution, which it will launch in cooperation with Gavi in West Africa. Proving identity without revealing any information about it is the idea behind Trust Stamp’s zero knowledge approach to online identity verification, according to a profile by Mastercard.

Gareth Genner, Trust Stamp co-founder and CEO, explains in an interview how the company’s Evergreen Hash technology uses biometrics without taking on the risk of spoofing or a data breach that he says come with standard biometric implementations.

The Evergreen Hash is created from the customers face, palm or fingerprint biometrics, which the company uses to generate a “3D mask,” discarding raw data and adding encryption to associate the data with the user.

Sable co-created the story with artist Kristian Donaldson (Unthinkable, The Guild) and Mey Rude, a transgender woman who served as a consulting editor on the project. Sable took some time to talk to SYFY WIRE about biohacking, transhumanism, and how science fiction often predicts the future.


The Dark, by screenwriter and playwright Mark Sable (Unthinkable, Godkillers), is a graphic novel about a world plunged into chaos when a biotech virus pulls everything offline. The plot twists around government conspiracies, techno warfare, biohacking, and the unlikely pair out to stop it before another world war breaks loose. To make it all the scarier, Sable bases his fiction on fact. As a futurist who has consulted with think tanks and The Art of Future Warfare Project, he is well versed in techno warfare scenarios.

The Dark begins in 2035 and follows Master Sergeant Robert Carter, a N.E.O. (Networked Exoskeleton Operator) Marine whose power armor links him to the world’s technology, and whose implants mentally connect him to his unit. He feels what they feel, which proves torturous when his unit is attacked. The Dark takes on a double meaning as the experience leaves him both physically and technologically blind as the world’s tech crashes.

His world changes when he is sent after Camille — a skilled biohacker and analyst for NSA’s Bumble Hive — who is on a mission to expose the government’s use of bio-hacked surveillance. But she’s also attempting to recode herself in the process. You see, Camille is a trans woman and has discovered a way to change her gender at the molecular level. Camille’s quest to expose the truth and Carter’s pursuit of that very truth throw them together in a race against time to save the world.

“Facial recognition is a uniquely dangerous form of surveillance. This is not just some Orwellian technology of the future — it’s being used by law enforcement agencies across the country right now, and doing harm to communities right now,” Fight for the Future deputy director Evan Greer said in a statement shared with VentureBeat and posted online.


Members of the United States Congress introduced a bill today, The Facial Recognition and Biometric Technology Moratorium Act of 2020, that would prohibit the use of U.S. federal funds to acquire facial recognition systems or “any biometric surveillance system” use by federal government officials. It would also withhold federal funding through the Byrne grant program for state and local governments that use the technology.

The bill is sponsored by Senators Ed Markey (D-MA) and Jeff Merkley (D-OR) as well as Representatives Ayanna Pressley (D-MA) and Pramila Jayapal (D-WA). Pressley previously introduced a bill prohibiting use of facial recognition in public housing, while Merkley introduced a facial recognition moratorium bill in February with Senator Cory Booker (D-NJ).

The news comes a day after the Boston City Council in Pressley’s congressional district unanimously passed a facial recognition ban, one of the largest cities in the United States to do so. News also emerged this week about Robert Williams, who’s thought to be the first person falsely accused of a crime and arrested due to misidentification by facial recognition.

A warning that hackers are exploiting vulnerable email servers doesn’t qualify as an unusual event in general. But when that warning comes from the National Security Agency, and the hackers are some of the most dangerous state-sponsored agents in the world, run-of-the-mill email server hacking becomes significantly more alarming.

On Thursday, the NSA issued an advisory that the Russian hacker group known as Sandworm, a unit of the GRU military intelligence agency, has been actively exploiting a known vulnerability in Exim, a commonly used mail transfer agent—an alternative to bigger players like Exchange and Sendmail—running on email servers around the world. The agency warns that Sandworm has been exploiting vulnerable Exim mail servers since at least August 2019, using the hacked servers as an initial infection point on target systems and likely pivoting to other parts of the victim’s network. And while the NSA hasn’t said who those targets have been, or how many there are, Sandworm’s history as one of the most aggressive and destructive hacking organizations in the world makes any new activity from the group worth noting.

“We still consider this to be one of the most, if not the most aggressive and potentially dangerous actor that we track,” says John Hultquist, the director of intelligence at FireEye, who also led a team at iSight Partners when that company first discovered and named Sandworm in 2014.

The US National Security Agency (NSA) has published today a security alert warning of a new wave of cyberattacks against email servers, attacks conducted by one of Russia’s most advanced cyber-espionage units.

The NSA says that members of Unit 74455 of the GRU Main Center for Special Technologies (GTsST), a division of the Russian military intelligence service, have been attacking email servers running the Exim mail transfer agent (MTA).

Also known as “Sandworm,” this group has been hacking Exim servers since August 2019 by exploiting a critical vulnerability tracked as CVE-2019–10149, the NSA said in a security alert [PDF] shared today with ZDNet.

A biometric data privacy suit against Clearview AI will move forward, and in the District Court for Northern Illinois, as requested by the plaintiff, after a pair of rulings by Judge Sharon Johnson Coleman reported by Law Street Media.

There are two separate BIPA cases currently ongoing against Clearview, known by their plaintiffs Hall and Mutnick. Mutnick filed a motion for a preliminary injunction several months into the case, and says in a clarified motion for reassignment that it is seeking to have Hall v. Clearview AI, Inc., et al. moved to Illinois, and that plaintiff Hall agrees with the motion.

Clearview had filed a motion to stay the proceedings pending decisions on its motion to dismiss based on personal jurisdiction, and to move the case to the Southern District of New York, where the company is based. In New York, Chief Justice Colleen McMahon said that because the suit applies an Illinois state law and includes class members based on their Illinois residence at the time of the alleged violation, it is not clear that the cases belong in New York district court.

ID R&D has released IDFraud Contact Center to prevent fraudsters from using stolen or fake identities to create new accounts and gain access to telco services and equipment, the company announced.

The solution leverages ID R&D’s Text Independent Voice Biometric technology to analyze the voices of new subscribers to identify fraud attempts by comparing voice prints against a database of known fraudster voices.

According to a Europol report, telco fraud is on the rise, generating an annual global loss of some $32 billion.