this post was submitted on 27 Oct 2023
73 points (86.9% liked)
Technology
59377 readers
5843 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It literally is a lock waiting to get picked. The keys have to be somewhere on the device to create the signature of the photo. This can be reverse engineered, although it may not be trivial.
Seriously, if cryptography can be reverse engineered we have a big fucking problem and photography will be the least of our issues.
It’s clear you don’t have a great understanding of how this works. You don’t have to break cryptography. You simply need to extract the cryptographic keys from the device and then reverse the algorithm it uses to create the sig of the photos.
Simply. Mate, what are you smoking?
So you're saying there's never been an instance of private keys getting leaked or extracted ever? And there's probably easier ways to break this than trying to extract the keys, especially if they're in some kind of secure chip. People can get the hardware, they can do whatever they want to it. Of course it's most likely going to be a lot harder than copying someone's SSH keys off a hard drive.