The 'threatened' element in the previous article is speech or language.
This article focuses on facial information.
![](https://static.wixstatic.com/media/492362_0ef8db6179c6439d8a30d1e4b03f10e8~mv2.jpg/v1/fill/w_800,h_500,al_c,q_85,enc_avif,quality_auto/492362_0ef8db6179c6439d8a30d1e4b03f10e8~mv2.jpg)
My Collage.
Use a creature to represent - the data stealer. The thief throws facial information from the plane to the public. This is using the data they have to tag people.
![](https://static.wixstatic.com/media/492362_087bacc18e71430b8668bc0901d2f757~mv2.jpg/v1/fill/w_980,h_980,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/492362_087bacc18e71430b8668bc0901d2f757~mv2.jpg)
Collections
Some of the next planned visual attempts.
![](https://static.wixstatic.com/media/492362_c67e98a7ef5c445492ea513ee3f85dca~mv2.png/v1/fill/w_563,h_567,al_c,q_85,enc_avif,quality_auto/492362_c67e98a7ef5c445492ea513ee3f85dca~mv2.png)
![](https://static.wixstatic.com/media/492362_5a0f94e4aed548ec8a3188871897b975~mv2.png/v1/fill/w_564,h_506,al_c,q_85,enc_avif,quality_auto/492362_5a0f94e4aed548ec8a3188871897b975~mv2.png)
![](https://static.wixstatic.com/media/492362_2299320578a443a3982067e93ebc3fcc~mv2.png/v1/fill/w_564,h_682,al_c,q_90,enc_avif,quality_auto/492362_2299320578a443a3982067e93ebc3fcc~mv2.png)
![](https://static.wixstatic.com/media/492362_1c5a8e8d2f3848168cead64180551d3b~mv2.png/v1/fill/w_500,h_501,al_c,q_85,enc_avif,quality_auto/492362_1c5a8e8d2f3848168cead64180551d3b~mv2.png)
![](https://static.wixstatic.com/media/492362_f3243cf2f2b34a578448f1989d2efe0f~mv2.png/v1/fill/w_564,h_789,al_c,q_90,enc_avif,quality_auto/492362_f3243cf2f2b34a578448f1989d2efe0f~mv2.png)
![](https://static.wixstatic.com/media/492362_6a9c1747771941a0a1bfe7d982885f9a~mv2.png/v1/fill/w_400,h_600,al_c,q_85,enc_avif,quality_auto/492362_6a9c1747771941a0a1bfe7d982885f9a~mv2.png)
Comments