General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsSurveillance Self Defense. Special info for protesters.
Reposted from Activist Headquarters.
https://www.democraticunderground.com/10114351
ICE is using electronic surveillance tools. Reposting these safety measures that limit their effectiveness.
Of special note: Attending a protest
https://ssd.eff.org/module/attending-protest
https://ssd.eff.org/
TIPS, TOOLS AND HOW-TOS FOR SAFER ONLINE COMMUNICATIONS
A PROJECT OF THE ELECTRONIC FRONTIER FOUNDATION
COPYRIGHT (CC BY)
Read the BASICS to find out how online surveillance works. Dive into our TOOL GUIDES for instructions to installing our pick of the best, most secure applications. We have more detailed information in our FURTHER LEARNING sections. If youd like a guided tour, look for our list of common SECURITY SCENARIOS.
Starts with basics. Lots of valuable info.
Of special note: Attending a protest
https://ssd.eff.org/module/attending-protest
A cheap flip phone/burner phone with only the ACLUs # seems smart idea
reACTIONary
(7,056 posts)..... your phone (any phone) is a cop.
Permanut
(8,131 posts)That when you buy a burner phone, get one at a store that does NOT have surveillance cameras.
Marie Marie
(11,039 posts)Permanut
(8,131 posts)ms liberty
(11,069 posts)S/V Loner
(9,503 posts)make facial IDs difficult. I would bet a lot of those sunglasses you see on ICE thugs block IR.
usonian
(24,102 posts)CV Dazzle and others are found mostly in academic papers.
Here's a simpler reference.
https://www.theregister.com/2025/01/15/make_up_thwart_facial_recognition/
paper: https://arxiv.org/abs/2412.13507
David Noever, Forrest McKee
This study demonstrates a novel approach to facial camouflage that combines targeted cosmetic perturbations and alpha transparency layer manipulation to evade modern facial recognition systems. Unlike previous methods -- such as CV dazzle, adversarial patches, and theatrical disguises -- this work achieves effective obfuscation through subtle modifications to key-point regions, particularly the brow, nose bridge, and jawline. Empirical testing with Haar cascade classifiers and commercial systems like BetaFaceAPI and Microsoft Bing Visual Search reveals that vertical perturbations near dense facial key points significantly disrupt detection without relying on overt disguises. Additionally, leveraging alpha transparency attacks in PNG images creates a dual-layer effect: faces remain visible to human observers but disappear in machine-readable RGB layers, rendering them unidentifiable during reverse image searches. The results highlight the potential for creating scalable, low-visibility facial obfuscation strategies that balance effectiveness and subtlety, opening pathways for defeating surveillance while maintaining plausible anonymity.
