{"id":14190,"date":"2023-10-16T16:58:54","date_gmt":"2023-10-16T14:58:54","guid":{"rendered":"https:\/\/immune.institute\/?p=14190"},"modified":"2023-10-16T16:58:54","modified_gmt":"2023-10-16T14:58:54","slug":"que-pasa-aplicacion-viral-epik","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/que-pasa-aplicacion-viral-epik\/","title":{"rendered":"What is happening with the viral application EPIK?"},"content":{"rendered":"<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:26% auto\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2022\/04\/Victor-Deutsch_EDIT.jpg\" alt=\"\" class=\"wp-image-12825 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\n<p class=\"wp-block-paragraph\">V\u00edctor Deutsch, professor of cybersecurity at the <a href=\"https:\/\/immune.institute\/en\/programas\/grado-en-ingenieria-de-desarrollo-de-software\/\" data-type=\"programas\" data-id=\"7753\" target=\"_blank\" rel=\"noreferrer noopener\">Software Development Engineering Degree<\/a> of IMMUNE.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">In the last few days, a lot of content has been circulating on social networks related to the <strong>EPIK<\/strong>an application that uses<strong> artificial intelligence<\/strong> to create images with our face in various versions of an American high school yearbook from the 90s. Although it is not a very disruptive technology, given that there were already applications for manipulating and creating this type of images, the novelty is that the company has made it available to the public for just 6.99 dollars. At such an affordable price, the downloads have shot up by the millions, flooding social networks, where celebrities and <em>influencers <\/em>such as Chanel, Laura Escanes and Lola Indigo have participated under the <em>hashtag <\/em>&nbsp;#YearBookChallenge.&nbsp;<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"14191\" src=\"https:\/\/principal.immune.institute\/wp-content\/uploads\/2023\/10\/Epik-1024x576.png\" alt=\"EPIK\" class=\"wp-image-14191\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik-1024x576.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik-256x144.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik-512x288.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik-768x432.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik-1536x864.png 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik-18x10.png 18w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<p class=\"has-text-align-center has-small-font-size wp-block-paragraph\"><em>photos of celebrities generated by the EPIK application<\/em><\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\">The debate on security and artificial intelligence has been reopened with EPIK.<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">EPIK's popularity has once again opened up the <strong>security debate<\/strong> of such AI-powered applications that hijack our data and images, especially after the<a href=\"https:\/\/elpais.com\/economia\/2023\/09\/19\/mis_derechos\/1695125490_270661.html\" target=\"_blank\" rel=\"noreferrer noopener\"> case in Almendralejo<\/a>in which a group of teenagers was the victim of <em>deepfakes <\/em>pornography made and disseminated by their schoolmates.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the case of EPIK, the conditions for using the application grant, with complete freedom, the <strong>transfer of data <\/strong>(geolocation, mobile device usage information and images) of users to third parties for 3 years or until the profile is closed. Without accepting these requirements, it is not possible to use the tool.&nbsp;<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-left has-medium-font-size\">How does EPIK benefit from this virality?<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">EPIK's profits are likely to come not so much from current subscription fees, but from the future value it aims to create.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On the one hand, there is a<strong> technological race<\/strong> between companies to develop applications for the creation of digital content that is increasingly similar to reality, until it is practically indistinguishable. In other words, to generate \"virtual worlds\" that produce user experiences that elicit the same stimuli as in a real situation. Although the idea of having a \"metaverse\" in the short term seems to have been exaggerated, the industry is still working in that direction. And what does the industry need to improve its applications? Lots and lots of spontaneous and diverse images that will allow them to enrich their \"engines\" of<em> machine learning<\/em> and gaining precision step by step. With this launch, EPIK has achieved millions of <strong>altruistic\" volunteers<\/strong> for their tests.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" data-id=\"14192\" src=\"https:\/\/principal.immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2-1024x576.png\" alt=\"\" class=\"wp-image-14192\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2-1024x576.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2-256x144.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2-512x288.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2-768x432.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2-1536x864.png 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2-18x10.png 18w, https:\/\/immune.institute\/wp-content\/uploads\/2023\/10\/Epik_2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">On the other hand, legal experts warn that the terms of service of EPIK, a Korean company, make it easy to share the <strong>private data of subscribers<\/strong> with others <em>business partners<\/em>. This opens the door for this data to be traded for other purposes that we cannot imagine. Some probably legal and where records can be anonymised or aggregated. But they can also be used to sharpen algorithms for targeted advertising or the delivery of unsolicited content.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&nbsp;Behind every cheap or free service, we can always find the <em>trade off <\/em>between privacy and functionality. It is important to bear this in mind when using such tools.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\">The transfer of data to the service of third parties<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">These very accessible applications open up the possibility for simple amateurs (without the need to belong to a large criminal organisation) to have at hand the tools for <strong>fraudulent actions<\/strong> or unethical campaigns. Without going any further in recent days, in some social networks such as LinkedIn, profiles with manipulated images are appearing that are very difficult to detect, unless you use image filters or recognise certain characteristics or common characteristics. Or that the image is \"too good\" to be real. <\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>What are we looking for?<\/strong> To attract attention in a context where we receive a lot of content or to generate some kind of affinity through clothing, physical characteristics or the type of activity that the photo represents. All the more reason why the accessibility of this technology will have an impact on networks such as Tik Tok, Reddit or similar.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\">Tips to avoid falling into this type of application such as EPIK<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>What can be done? <\/strong>In general, have the same warning signs as for any unsolicited online contact: a certain scepticism that leads to checking the identity and intentions of the contact. Be friendly, yes, but be careful in the data we disclose and always be ready to report when we detect abuse. In the same way as we would in the \"physical world\".<\/p>","protected":false},"excerpt":{"rendered":"<p>V\u00edctor Deutsch, profesor de ciberseguridad en el Grado de Ingenier\u00eda de Desarrollo de Software de IMMUNE. En los \u00faltimos d\u00edas ha estado circulando en las redes sociales mucho contenido relacionado con EPIK, una aplicaci\u00f3n que utiliza inteligencia artificial para crear im\u00e1genes con nuestra cara en varias versiones de anuario de instituto americano de los 90. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":14212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[83,84],"class_list":["post-14190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-seguridad-cibernetica","tag-seguridad-informatica"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/14190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=14190"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/14190\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/14212"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=14190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=14190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=14190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}