Safety gap exposed Clearview AI resource code

INSUBCONTINENT EXCLUSIVE:
Since it exploded onto the scene in January after a newspaper exposé, Clearview AI quickly became one of the most elusive, secretive and
reviled companies in the tech startup scene. The controversial facial recognition startup allows its law enforcement users to take a picture
of a person, upload it and match it against its alleged database of 3 billion images, which the company scraped from public social media
profiles. But for a time, a misconfigured server exposed the company internal files, apps and source code for anyone on the internet to
find. Mossab Hussein, chief security officer at Dubai-based cybersecurity firm SpiderSilk, found the repository storing Clearview source
code
Although the repository was protected with a password, a misconfigured setting allowed anyone to register as a new user to log in to the
system storing the code. The repository contained Clearview source code, which could be used to compile and run the apps from scratch
The repository also stored some of the company secret keys and credentials, which granted access to Clearview cloud storage buckets
Inside those buckets, Clearview stored copies of its finished Windows, Mac and Android apps, as well as its iOS app, which Apple recently
blocked for violating its rules
The storage buckets also contained early, pre-release developer app versions that are typically only for testing, Hussein said. The
repository also exposed Clearview Slack tokens, according to Hussein, which, if used, could have allowed password-less access to the company
private messages and communications. Clearview has been dogged by privacy concerns since it was forced out of stealth following a profile in
The New York Times, but its technology has gone largely untested and the accuracy of its facial recognition tech unproven
Clearview claims it only allows law enforcement to use its technology, but reports show that the startup courted users from private
businesses like Macy&s, Walmart and the NBA
But this latest security lapse is likely to invite greater scrutiny of the company security and privacy practices. When reached for comment,
Clearview founder Hoan Ton-That claimed his company &experienced a constant stream of cyber intrusion attempts, and have been investing
heavily in augmenting our security. We have set up a bug bounty program with HackerOne whereby computer security researchers can be rewarded
for finding flaws in Clearview AI systems,& said Ton-That
&SpiderSilk, a firm that was not a part of our bug bounty program, found a flaw in Clearview AI and reached out to us
This flaw did not expose any personally identifiable information, search history or biometric identifiers,& he said. Clearview AI app for
iOS did not need a log-in, according to Hussein
He took several screenshots to show how the app works
In this example, Hussein used a photo of Mark Zuckerberg. Ton-That accused the research firm of extortion, but emails between Clearview and
SpiderSilk paint a different picture. Hussein, who has previously reported security issues at several startups, including MoviePass, Remine
and Blind, said he reported the exposure to Clearview but declined to accept a bounty, which he said if signed would have barred him from
publicly disclosing the security lapse. It not uncommon for companies to use bug bounty terms and conditions or non-disclosure agreements to
prevent the disclosure of security lapses once they are fixed
But experts told TechCrunch that researchers are not obligated to accept a bounty or agree to disclosure rules. Ton-That said that Clearview
has &done a full forensic audit of the host to confirm no other unauthorized access occurred.& He also confirmed that the secret keys have
been changed and no longer work. Hussein findings offer a rare glimpse into the operations of the secretive company
One screenshot shared by Hussein showed code and apps referencing the company Insight Camera, which Ton-That described as a &prototype&
camera, since discontinued. A screenshot of Clearview AI app for macOS
It connects to Clearview database through an API
The app also references Clearview former prototype camera hardware, Insight Camera. According to BuzzFeed News, one of the firms that tested
the cameras is New York City real estate firm Rudin Management, which trialed use of a camera at two of its city residential
buildings. Hussein said that he found some 70,000 videos in one of Clearview cloud storage buckets, taken from a camera installed at
face-height in the lobby of a residential building
The videos show residents entering and leaving the building. Ton-That explained that, &as part of prototyping a security camera product we
collected some raw video strictly for debugging purposes, with the permission of the building management. TechCrunch has learned that the
Rudin-owned building is on Manhattan east side
Several property listings with images of the building lobby also confirm this
A representative for the real estate company did not return our emails. One of the videos from a camera in a lobby of a residential
building, recording residents (blurred by TechCrunch) as they pass by. Clearview has come under intense scrutiny since its January debut
It has also attracted the attention of hackers. In February, Clearview admitted to customers that a list of its customers was stolen in a
data breach — though, it claimed its servers were &never accessed.& Clearview also left unprotected several of its cloud storage buckets
containing its Android app. Vermont attorney general office has already opened an investigation into the company for allegedly violating
consumer protection laws, and police departments have been told to stop using Clearview, including in New Jersey and San Diego
Several tech companies, including Facebook, Twitter and YouTube, have already filed cease-and-desist letters with Clearview AI. In an
interview with CBS News in February, Ton-That defended his company practices
&If it public and it out there and could be inside Google search engine, it can be inside ours as well,& he said. Got a tip? You can send
tips securely over Signal and WhatsApp to +1 646-755-8849.