Threats and Consequences of Trending #5differentlooks

Security Nov 14, 2020

What is this #5differentlooks is actually?

We cannot go out and socialize during this pandemic, so people are turning to social media to share what is going on with their lives, therefore Facebook users these days are challenging their friends and families using different Hashtags. The most trending challenge that can be seen currently is 5 different Looks Challenge (or just the Five Looks Challenge) and Facebook users have taken it so far with their creative ideas. You can simply guess what it is by the name it has. Nobody knows who actually started it for the first time but this has hit the timelines so hard!

What the challenge is about?

The challenge is pretty simple, all you have to do is take photographs of different versions of yourself and post in the social media with the hashtag “#5differentlooks” in your caption setting it up as a set of one image or in a single post. The versions of yourself should look different enough to keep the viewer’s happy. Yet there are people who has not stop complaining that the challenge has been done incorrectly. Then again, without the comments this challenge wouldn’t been so popular all over. People also fail to understand the consequences that happens when accepting challenges like this.
Meanwhile this challenge is also brought over to other social Medias like twitter, tiktok and Instagram.

What are the threats behind this #5differentlooks?

Well, coming back to the main topic.
There are several consequences where photos shared by users on social media or image hosting platforms were stolen, made public to humiliate or blackmail them and misused for fraud and identity theft. Sharing photos of different dimensions of yourself in the social media can also be used to unlock stolen smartphones where face unlocking mechanism was poorly implemented.

Another threat includes the Facial reenactment .Facial reenactment refers to the modifications brought to the target actions in the form of change of movement of the head, lips, and facial expression. The techniques allowing for reenactment have been devised with the intent of improving the experience, specifically in the case of movies with the dubbing of target actors and teleconferencing. However, the malicious use of such techniques cannot be ruled out. Specifically, reenactment techniques are capable of synthesizing photo-realistic videos and images that are hard to detect with the human eye or even with existing forgery detection techniques. Data compression also adds to the challenge of the detection task as often, the media in circulation are highly compressed and offer little knowledge of being altered.

Recent trends like this, where women upload their pictures on their social media accounts and tag their friends just like the one in the #5differentlook challenge, creating a chain, present endless opportunities to criminal elements to prey on misusing them to create nudes, which are then used for extortion, pornography and blackmail. Clothes are digitally removed from pictures of women by Artificial Intelligence (AI), and spread on the messaging app Telegram. But those running the service said it was simply "entertainment". Deep fakes are computer-generated, often realistic images and video, based on a real template. One of its uses has been to create faked pornographic video clips of celebrities. The artificial intelligence-powered bot lives inside a Telegram private messaging channel. Users can send the bot a photo of a woman, and it will digitally remove her clothes in minutes, at no cost.

In conclusion

There is always some reason for something to startup and become popular. Likewise this particular challenge might have been arise for specific reasons. Therefore it is always important to keep yourself safe from any consequences that may or may not impact your life.

Great! You've successfully subscribed.
Great! Next, complete checkout for full access.
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.