Facial recognition company Clearview AI notified customers that an intruder had gained « unauthorized access » to its entire list of customers, The Daily Beast reports.
Clearview gained widespread attention in recent weeks after a wave of media coverage, starting with The New York Times in January. The company stands out from others due to its use of a database of over 3 billion photos the firm constructed by scraping images from Facebook, Twitter, Instagram, and other social networks and websites.
Clearview sells its product to law enforcement clients particularly in the U.S. The company’s app allows a customer to point their phone’s camera at a subject, or upload a photo into the system. Then, the system provides links to other photos and related social media profiles of the suspected person online.
Were you behind the Clearview breach? Did you receive the Clearview breach notification? We’d love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on firstname.lastname@example.org, or email email@example.com.
« Security is Clearview’s top priority. Unfortunately, data breaches are part of life in the 21st century. Our servers were never accessed. We patched the flaw, and continue to work to strengthen our security, » Tor Ekeland, an attorney working for Clearview, said in a statement to Motherboard.
Update: This piece has been updated to include a statement from Ekeland sent to Motherboard.
Subscribe to our cybersecurity podcast, CYBER.