New Leica camera stops deepfakes at the shutter - eviltoast
  • BitSound@lemmy.world
    link
    fedilink
    English
    arrow-up
    51
    arrow-down
    4
    ·
    1 year ago

    This is tilting at windmills. If someone has physical possession of a piece of hardware, you should assume that it’s been compromised down to the silicon, no matter what clever tricks they’ve tried to stymie hackers with. Also, the analog hole will always exist. Just generate a deepfake and then take a picture of it.

    • hyperhopper@lemmy.ml
      link
      fedilink
      English
      arrow-up
      36
      arrow-down
      1
      ·
      1 year ago

      You have it backwards. This is not too stop fake photos, despite the awful headline. It’s to attempt to provide a chain of custody and attestation. “I trust tom only takes real photos, and I can see this thing came from Tom”

      • FaceDeer@kbin.social
        link
        fedilink
        arrow-up
        15
        arrow-down
        1
        ·
        1 year ago

        And if the credentials get published to a suitable public timestamped database you can also say “we know this photo existed in this form at this specific time.” One of the examples mentioned in the article is the situation where that hospital got blown up in Gaza and Israel posted video of Hamas launching rockets to try to prove that Hamas did it, and the lack of a reliable timestamp on the video made it somewhat useless. If the video had been taken with something that published certificates within minutes of making it that would have settled the question.

        • BitSound@lemmy.world
          link
          fedilink
          English
          arrow-up
          9
          ·
          edit-2
          1 year ago

          That doesn’t really work. If the private key is leaked, you’re left in a quandary of “Well who knew the private key at this timestamp?” and it becomes a guessing game.

          Especially in the scenario you posit. Nation-state actors with deep pockets in the middle of a war will find ways to bend hardware to their will. Blindly trusting a record just because it’s timestamped is foolish.

          • 4am@lemm.ee
            link
            fedilink
            English
            arrow-up
            6
            arrow-down
            1
            ·
            1 year ago

            You’re right, it isn’t perfect so we shouldn’t bother trying. 🙄

                • lolcatnip@reddthat.com
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 year ago

                  We’re talking about a signature that’s published in a public database. The camera’s timestamp doesn’t matter, just the database’s.

          • FaceDeer@kbin.social
            link
            fedilink
            arrow-up
            4
            ·
            1 year ago

            If all that you’re interested in is the timestamp then you don’t even really need to have a signature at all - just the hash of the image is sufficient to prove when it was taken. The signature is only important if you care about trying to establish who took the picture, which in the case of this hospital explosion is not as important.

              • FaceDeer@kbin.social
                link
                fedilink
                arrow-up
                1
                ·
                1 year ago

                You post it publicly somewhere that has a timestamp. A blockchain would be best because it can’t be tampered with.

        • FaceDeer@kbin.social
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Unless the evil maid is also capable of time travel there’s no way for them to mess with the timestamps of things once they’ve been published. She could take some pictures with the camera but not tamper with ones that have already been taken.