[Phase 1]HIP XX - Clarify what constitutes facial recognition obfuscation

HIP: <Number to be assigned>
title: Clarify what constitutes facial recognition obfuscation 
author: ludoviko.eth,
status: Draft
created: 2022-11-22

Simple Summary

This hip will help avoid unnecesary challenges to spurious challenges arguing that facial recognition is being altered.

Abstract

This HIP will require that the challenger needs to provide clear and fact-based evidence that the infringement in the registration policy is not a honest mistake and that it actually obfuscates facial-recognition algorithms.

Motivation

Challenges and rulings in Proof of Humanity are being exploited under the claim that certain registrations mistakes are obfuscating facial recognition algorithms. These claims are totally unfounded and are probably a way to increase dispute numbers and clearly a bad-faith attempt to steal the deposit from unaware people. Challenges for lipsticks, alleged bad lighting or others are examples of this exploitation.

Specification

(Required for Phase 2)

Rationale

(Recommended for Phase 2)

Implementation

(If necessary, recommended for Phase 3)

1 Like

I have edited this so that it makes a more clear and attainable goal.

I am updating this HIP to address recent challenge situations that need updates. Some parts need debate and expansion. Contact me if you want to be a coauthor.

HIP: <Number to be assigned>
title: Clarify what constitutes facial recognition obfuscation 
author: ludoviko.eth,
status: Draft
created: 2022-11-22

Simple Summary

This hip will help avoid unnecesary challenges to spurious challenges arguing that facial recognition is being altered.

Abstract

This HIP will require that the challenger needs to provide clear and fact-based evidence that the infringement in the registration policy is not a honest mistake and that it actually obfuscates facial-recognition algorithms.

Motivation

Challenges and rulings in Proof of Humanity are being exploited under the claim that certain registrations mistakes are obfuscating facial recognition algorithms. These claims are totally unfounded and are probably a way to increase dispute numbers and clearly a bad-faith attempt to steal the deposit from unaware people. Challenges for lipsticks, alleged bad lighting or others are examples of this exploitation.

Specification

What is recognized as “facial features”

Facial features are usually recognized as the “inner face”, meaning the following elements:

  • complete eyes, which include both corners of each eyes.
    • Some anatomical features do not allow the person to completely open their eyes and
  • at least 2/3rd of eyebrows
  • nose

Things to debate. Do any of these features suppose a threat to sybil resistance?

  • Chin (like in bearded people)
  • Forehead (when it is partially ocluded by hair or religious garments).
  • Whole external contour of face

Makeup

  • During the ideation phase we need to define the lipstick issue and what other abuses to the policy happened since the last reform

Bindi

To be expanded

Religious garments that partially cover forehead

To be expanded

Hairstyle

To be expanded

Rationale

(Recommended for Phase 2)

Implementation

(If necessary, recommended for Phase 3)
[/quote]

HIP: <Number to be assigned>
title: Clarify what constitutes facial recognition obfuscation 
author: ludoviko.eth,
status: Draft
created: 2022-11-22

Simple Summary

This hip will help avoid unnecesary challenges to spurious challenges arguing that facial recognition is being altered.

Abstract

This HIP will require that the challenger needs to provide clear and fact-based evidence that the infringement in the registration policy is not a honest mistake and that it actually obfuscates facial-recognition algorithms.

Motivation

Challenges and rulings in Proof of Humanity are being exploited under the claim that certain registrations mistakes are obfuscating facial recognition algorithms. These claims are totally unfounded and are probably a way to increase dispute numbers and clearly a bad-faith attempt to steal the deposit from unaware people. Challenges for lipsticks, alleged bad lighting or others are examples of this exploitation.

Specification

(Required for Phase 2)

Rationale

(Recommended for Phase 2)

Implementation

(If necessary, recommended for Phase 3)