this post was submitted on 21 Nov 2023
146 points (92.0% liked)

Technology

58157 readers
3528 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] BitSound@lemmy.world 44 points 10 months ago (1 children)

This is tilting at windmills. If someone has physical possession of a piece of hardware, you should assume that it's been compromised down to the silicon, no matter what clever tricks they've tried to stymie hackers with. Also, the analog hole will always exist. Just generate a deepfake and then take a picture of it.

[–] hyperhopper@lemmy.ml 39 points 10 months ago (1 children)

You have it backwards. This is not too stop fake photos, despite the awful headline. It's to attempt to provide a chain of custody and attestation. "I trust tom only takes real photos, and I can see this thing came from Tom"

[–] BitSound@lemmy.world -2 points 10 months ago

And Tom's camera gets hacked by an evil maid and then where are you? Exactly. This is snake oil.