Aggregator

Gamers REVOLT over age-verify scheme subjecting users to 'suspicious entity detection'

2 weeks 2 days ago


Chatbot-user selfies are reportedly being analyzed and not only checked for suspiciousness, but to see if they match the faces of any public figures.

Video gamers staged a collective rebellion when they discovered that Discord, the dominant gamer chat platform, had slipped a pilot program into the U.K. user experience that could route personal information to the government via a company called Persona, linked to OpenAI. Discord quickly backtracked, frustrated that new age verification laws in the Anglosphere have made it difficult to find partners that pass user muster. But the controversy rages on.

A group of researchers say they stumbled upon publicly available code in OpenAI that shows an in-depth system meant for analyzing user facial data while also checking to see if the user has hijacked a dead person's identity.

'269 checks. for wanting to use a chatbot in 2026.'

Researchers from website Vmfunc recently revealed they came across 53 megabytes of "unprotected source maps" that are set up for government use. The researchers also stated that any suspicious user activity would be filed with federal authorities, while user selfies are analyzed and screened using facial recognition.

The data being collected is reportedly through Persona's Know Your Customer service. Simply put, it is an identity verification program.

Not only does OpenAI publicly state that it uses Persona as a "trusted third-party company" to "help verify age," but Persona itself announced it is authorized to "serve federal agencies where the loss of confidentiality, integrity, or availability of processed data could result in limited adverse effects."

It was Persona that the researchers poked fun at, revealing a complex verification system that checks user selfie data.

RELATED: Sam Altman slams ICE in message to OpenAI employees: 'What's happening ... is going too far'

"So you uploaded a selfie to use a chatbot. Congratulations!!!" the report joked. "It's now being compared against a database of every politician, head of state, and their extended family tree on Earth. Similarity scored. Low, medium, high. The machine looked at your face and asked itself: 'Does this person resemble the deputy finance minister of Moldova?' And it answered. And it wrote the answer down."

The report then described 269 verification checks that perform acts like comparing a user's selfie to their ID or other existing accounts.

Other checks like "public figure detection" allegedly seek to check if the user looks like someone famous, while "suspicious entity detection" reportedly is checking to see if the user looks "suspicious."

In total, there are an alleged 43 government ID checks and 27 database checks that cross-reference social security numbers, phone carriers, and death databases.

"269 checks. For wanting to use a chatbot in 2026," researchers wrote.

RELATED: ChatGPT says it is not sharing your conversations with advertisers, but there's a catch

Photo by David Burnett/Newsmakers via Getty Images

Neither OpenAI nor Persona responded to Return's request for comment. However, Persona founder Rick Song has publicly stated he would cooperate with the researchers and answer their questions.

After stating he had an "online crashout" in response to misinformation, Song said his dialogue with Vmfunc is ongoing and shared several emails he has exchanged with the company. One of the emails stated that OpenAI does not use Persona's "biometrics for Watchlists" or products related to identifying politically exposed persons.

He also noted that Persona's max retention for data is three years, while OpenAI's policy is just one year.

For additional information on how OpenAI treats user data, please visit its website.

Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!

Andrew Chapados

Pro-choice pastor claims ‘most women seeking abortions are religiously affiliated’

2 weeks 2 days ago


During a sermon at the First Congregational Church in South Portland, Maine, retired Presbyterian minister Marvin Ellison attempted to claim that abortion can be an act of love — and that the women seeking them are often religious themselves.

“This morning, I speak from my experience as a volunteer chaplain for Planned Parenthood. Without naming names or breaking confidences, I want to just speak about a few things I’ve learned from women who’ve received abortions and candidly shared their story with me,” the pastor explained.

The pastor went on to claim that “most women electing to terminate a pregnancy are religiously affiliated.”


“So I’ve listened to and prayed with Protestant, Catholic, and Jewish women. With Muslim and Buddhist women. And with conservative evangelical women. And some confided in me that they had never expected to find a Christian minister inside Planned Parenthood. Maybe outside the clinic protesting, but they hadn’t imagined that they would meet a Christian minister inside the clinic,” he said.

BlazeTV host Pat Gray is in disbelief.

“How do you make that case, that yeah, Jesus is fine with you ending the life of your child?” Gray asks.

“He wants to send you a child and then have you terminate that child. Wait, what? ... It doesn’t even make sense,” he adds.

Want more from Pat Gray?

To enjoy more of Pat's biting analysis and signature wit as he restores common sense to a senseless world, subscribe to BlazeTV — the largest multi-platform network of voices who love America, defend the Constitution, and live the American dream.

BlazeTV Staff

Apple issues a critical software update for iPhone. Install it now!

2 weeks 2 days ago


Last week, Apple issued an important software update for iPhones on iOS 26. While the latest version included the usual vague “bug fixes and updates,” it also contained a critical patch for a zero-day vulnerability that has already been exploited by hackers on targeted devices. To put it mildly, you need to update your iPhone now, or your device and private data are all at risk.

What is a zero-day vulnerability?

In case you’ve never heard the phrase before, zero-day vulnerabilities are unknown security threats within a device’s software that exist outside of the developer’s purview. These can pop for a variety of reasons, including flaws in the source code, improper input validation that processes malicious data, and simple developer oversight.

An extremely sophisticated attack against specific targeted individuals.

What’s worse, these exploits are often found first by hackers and used to inject malicious code into targeted devices to bypass security protocols and gain access to either steal private data or install malware to spy on users.

The thing that makes zero-day vulnerabilities so dangerous is that hackers can use them to access devices for weeks or even months before developers isolate the problem and issue a fix.

iOS 26.3 patches iPhone’s latest major security hole

Apple sent an over-the-air update to iPhones on iOS 26 last week. Bringing the version number to 26.3, the latest release includes a fix for CVE-2026-20700, a zero-day threat that was identified by Google’s Threat Analysis Group.

In case you’re wondering how Google found a security flaw in an Apple product, TAG is a team of researchers who regularly scour first-party and third-party products in search of security flaws and cyber threats. They specialize in thwarting “government-backed attacks,” suggesting that CVE-2026-20700 likely has government ties — either foreign or domestic — though neither Apple nor Google assigned blame to a particular group.

Once discovered, TAG informed Apple of the vulnerability, giving the company valuable time to patch the hole before informing the public and letting hackers know that the loophole was closed.

RELATED: Your car can get hacked — here's how to protect yourself

JIRAROJ PRADITCHAROENKUL

As part of the change log that was released alongside iOS 26.3, Apple admitted, “An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26.”

In other words, the exploit exists and it has already been leveraged against a small subset of users.

How to upgrade to iOS 26.3

To patch this zero-day vulnerability on your devices, you should update to iOS 26.3 immediately. You can download the update by following these directions:

  • Open the Settings app on your iPhone.
  • Tap “General.”
  • Select the second option called “Software Update.”
  • At the bottom of the next screen, choose “Update Now.”

Screenshots by Zach Laidlaw

Note that iPhones aren’t the only Apple devices at risk. You should also update your iPad to iPadOS 26.3, if it’s available.

For those who are still on an older version of iOS, Apple has not indicated a fix for the zero-day issue at this time. That either means the zero-day threat isn’t as invasive on older software, or a fix hasn’t been implemented yet. Either way, users on older iOS versions should update to iOS 18.7.5 for the latest security fixes.

More features in iOS 26.3

In addition to a major security patch, iOS 26.3 includes several additional features, such as the ability to prevent carrier networks from seeing the precise location of select iPhones with an Apple C-series modem (right now, that only includes iPhone Air and iPhone 16e), new switch-to-Android tools, and a snazzy live weather wallpaper. This update is free and available now to iPhones 11 and up.

Zach Laidlaw

Trump Warns Trading Partners Not To 'Play Games' With Trade Deals After Supreme Court Ruling

2 weeks 2 days ago

President Donald Trump warned Monday that countries attempting to exploit the Supreme Court’s tariff ruling to escape trade agreements will face steeper tariffs than those they originally negotiated with his administration. “Any Country that wants to ‘play games’ with the

The post Trump Warns Trading Partners Not To ‘Play Games’ With Trade Deals After Supreme Court Ruling appeared first on Breitbart.

John Carney

When Nine Houses On One Acre Isn’t Affordable For Anyone

2 weeks 2 days ago
With the ink still dripping wet on HB 8002 — rushed through as an “emergency” solution to a sudden housing crisis — the Connecticut Senate is now slicing up land thinner than a slice of pizza at a child’s birthday party.
Dr. Michael Goldstein and Jonathan Goldstein