<s>
Fawkes	B-Application
is	O
a	O
facial	O
image	O
cloaking	O
software	O
created	O
by	O
the	O
SAND	O
(	O
Security	O
,	O
Algorithms	O
,	O
Networking	O
and	O
Data	O
)	O
Laboratory	O
of	O
the	O
University	O
of	O
Chicago	O
.	O
</s>
<s>
The	O
software	O
creates	O
small	O
alterations	O
in	O
images	O
using	O
artificial	B-Application
intelligence	I-Application
to	O
protect	O
the	O
images	O
from	O
being	O
recognized	O
and	O
matched	O
by	O
facial	O
recognition	O
software	O
.	O
</s>
<s>
The	O
goal	O
of	O
the	O
Fawkes	B-Application
program	O
is	O
to	O
enable	O
individuals	O
to	O
protect	O
their	O
own	O
privacy	O
from	O
large	O
data	O
collection	O
.	O
</s>
<s>
As	O
of	O
May	O
2022	O
Fawkes	B-Application
v1.0	O
has	O
surpassed	O
840,000	O
downloads	O
.	O
</s>
<s>
The	O
Fawkes	B-Application
program	O
was	O
named	O
after	O
the	O
fictional	O
protagonist	O
from	O
the	O
movie	O
and	O
comic	O
V	O
for	O
Vendetta	O
,	O
who	O
drew	O
inspiration	O
from	O
historical	O
figure	O
Guy	O
Fawkes	B-Application
.	O
</s>
<s>
The	O
Fawkes	B-Application
proposal	O
was	O
initially	O
presented	O
at	O
a	O
USENIX	B-Operating_System
Security	I-Operating_System
conference	O
in	O
August	O
2020	O
where	O
it	O
received	O
approval	O
and	O
was	O
launched	O
shortly	O
after	O
.	O
</s>
<s>
The	O
most	O
recent	O
version	O
available	O
for	O
download	O
,	O
Fawkes	B-Application
v1.0	O
,	O
was	O
released	O
in	O
April	O
2021	O
and	O
is	O
still	O
being	O
updated	O
in	O
2022	O
.	O
</s>
<s>
The	O
team	O
cites	O
nonconsensual	O
data	O
collection	O
,	O
specifically	O
done	O
by	O
such	O
companies	O
as	O
Clearwater	O
AI	B-Application
,	O
as	O
being	O
the	O
prime	O
inspiration	O
behind	O
the	O
creation	O
of	O
Fawkes	B-Application
.	O
</s>
<s>
The	O
methods	O
that	O
Fawkes	B-Application
uses	O
can	O
be	O
identified	O
as	O
similar	O
to	O
adversarial	B-General_Concept
machine	I-General_Concept
learning	I-General_Concept
.	O
</s>
<s>
Fawkes	B-Application
also	O
uses	O
data	O
poisoning	O
attacks	O
,	O
which	O
change	O
the	O
data	O
set	O
used	O
to	O
train	O
certain	O
deep	O
learning	O
models	O
.	O
</s>
<s>
Fawkes	B-Application
utilizes	O
two	O
types	O
of	O
data	O
poisoning	O
techniques	O
:	O
clean	O
label	O
attacks	O
and	O
model	O
corruption	O
attacks	O
.	O
</s>
<s>
The	O
creators	O
of	O
Fawkes	B-Application
identifies	O
that	O
using	O
sybil	O
images	O
can	O
increase	O
the	O
effectiveness	O
of	O
their	O
software	O
against	O
recognition	O
softwares	O
.	O
</s>
<s>
Privacy	O
preserving	O
machine	O
learning	O
uses	O
techniques	O
similar	O
to	O
the	O
Fawkes	B-Application
software	O
but	O
opts	O
for	O
differentially	O
private	O
model	O
training	O
which	O
helps	O
to	O
keep	O
information	O
in	O
the	O
data	O
set	O
private	O
.	O
</s>
<s>
Fawkes	B-Application
image	O
cloaking	O
can	O
be	O
used	O
on	O
images	O
and	O
apps	O
that	O
we	O
use	O
everyday	O
.	O
</s>
<s>
A	O
similar	O
facial	O
cloaking	O
software	O
to	O
Fawkes	B-Application
is	O
called	O
.	O
</s>
<s>
LowKey	O
also	O
alters	O
images	O
on	O
a	O
visual	O
level	O
,	O
but	O
these	O
alterations	O
are	O
much	O
more	O
noticeable	O
compared	O
to	O
the	O
Fawkes	B-Application
software	O
.	O
</s>
