@KeirGiles @citizenlab 6/ Takeaway for us: some sophisticated threat actors are feeling pressure & innovating.
Trying to move away from smash & grab phishing for passwords (& maybe your 2nd factor code)... and going for something more subtle, slower perhaps less detectable.
8/ There were so many clever bits to this attack, it's easy to imagine a lot of people falling for it.
Everything was clean. The doc looked real. The language was right. Email addresses at the State Dept. seemed to be CC'd.. I could go on.
They even had Keir enter "ms.state. gov" into the ASP name...
(this doesn't do anything but further the deception that he's adding an external app to his Gmail, that name field accepts any text you want to put in there)
Friends don't let friends get their eyeballs scanned to buy a coffee.
Sam Altman's Orwellian "Tools for Humanity" says this dystopia machine could help distinguish between #AI agents & humans... or verify at Point of Sale..or..?
Looks to me like a big biometric data grab 1/
2/ Surely they didn't just start with the idea of invasively harvesting eyeball scans...and then look around for potential justifications.
And then add in some AI hype.
Right?
3/ Throwback to Tools for Humanity's previous (but non-portable, guys!) eye-scanning thing: WorldCoin.
Remember that? A global biometric data grab rife with documented exploitation in Africa & Latin America.
Still not clear what real value it delivered to the ppl who gave up their biometrics.