You are viewing a single thread.
View all comments View context
10 points
*

That doesn’t really work. If the private key is leaked, you’re left in a quandary of “Well who knew the private key at this timestamp?” and it becomes a guessing game.

Especially in the scenario you posit. Nation-state actors with deep pockets in the middle of a war will find ways to bend hardware to their will. Blindly trusting a record just because it’s timestamped is foolish.

permalink
report
parent
reply
2 points

Maybe each camera has a different public/private key?

permalink
report
parent
reply
1 point
*

They would, but each camera’s private key can be extracted from the hardware if you’re motivated enough.

If Alice’s fancy new camera has the private key extracted by Eve without Alice’s knowledge, Eve can send Bob pictures that Bob would then believe are from Alice. If Bob finds out that Alice’s key was compromised, then he has to guess as to whether any photo he got from Alice was actually from Eve. Having a public timestamp for the picture doesn’t help Bob know anything, since Eve might’ve gone and created the timestamp herself without Alice’s knowledge.

permalink
report
parent
reply
2 points
*

Still, unique keys for each camera would lessen the risk of someone leaking a single code that undermines the whole system, as happened with DVDs.

And if an interested party wanted to steal a camera’s private key to fake an image’s provenance they’d need to get physical access to that very camera. Perhaps a state-sponsored group could contrive this (or intervene during manufacturing), but it is a challenge and an even bigger challenge for everyone else.

permalink
report
parent
reply
9 points

You’re right, it isn’t perfect so we shouldn’t bother trying. 🙄

permalink
report
parent
reply
3 points

In this case yes, because if it’s not perfect, then it’s perfectly useless

permalink
report
parent
reply
2 points

Couldn’t I just change the camera date?

permalink
report
parent
reply
4 points

If all that you’re interested in is the timestamp then you don’t even really need to have a signature at all - just the hash of the image is sufficient to prove when it was taken. The signature is only important if you care about trying to establish who took the picture, which in the case of this hospital explosion is not as important.

permalink
report
parent
reply
1 point

How is a hash of the image supposed to prove anything about when it was created?

permalink
report
parent
reply
3 points

You post it publicly somewhere that has a timestamp. A blockchain would be best because it can’t be tampered with.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 18K

    Monthly active users

  • 12K

    Posts

  • 541K

    Comments