161
you are viewing a single comment's thread
view the rest of the comments
[-] BitSound@lemmy.world 51 points 1 year ago

This is tilting at windmills. If someone has physical possession of a piece of hardware, you should assume that it's been compromised down to the silicon, no matter what clever tricks they've tried to stymie hackers with. Also, the analog hole will always exist. Just generate a deepfake and then take a picture of it.

[-] hyperhopper@lemmy.ml 41 points 1 year ago

You have it backwards. This is not too stop fake photos, despite the awful headline. It's to attempt to provide a chain of custody and attestation. "I trust tom only takes real photos, and I can see this thing came from Tom"

[-] FaceDeer@kbin.social 20 points 1 year ago

And if the credentials get published to a suitable public timestamped database you can also say "we know this photo existed in this form at this specific time." One of the examples mentioned in the article is the situation where that hospital got blown up in Gaza and Israel posted video of Hamas launching rockets to try to prove that Hamas did it, and the lack of a reliable timestamp on the video made it somewhat useless. If the video had been taken with something that published certificates within minutes of making it that would have settled the question.

[-] BitSound@lemmy.world 10 points 1 year ago* (last edited 1 year ago)

That doesn't really work. If the private key is leaked, you're left in a quandary of "Well who knew the private key at this timestamp?" and it becomes a guessing game.

Especially in the scenario you posit. Nation-state actors with deep pockets in the middle of a war will find ways to bend hardware to their will. Blindly trusting a record just because it's timestamped is foolish.

[-] 4am@lemm.ee 8 points 1 year ago

You’re right, it isn’t perfect so we shouldn’t bother trying. 🙄

[-] BitSound@lemmy.world 3 points 1 year ago

In this case yes, because if it's not perfect, then it's perfectly useless

[-] tsonfeir@lemm.ee 2 points 1 year ago

Couldn’t I just change the camera date?

[-] lolcatnip@reddthat.com 3 points 1 year ago

We're talking about a signature that's published in a public database. The camera's timestamp doesn't matter, just the database's.

[-] FaceDeer@kbin.social 4 points 1 year ago

If all that you're interested in is the timestamp then you don't even really need to have a signature at all - just the hash of the image is sufficient to prove when it was taken. The signature is only important if you care about trying to establish who took the picture, which in the case of this hospital explosion is not as important.

[-] lolcatnip@reddthat.com 1 points 1 year ago

How is a hash of the image supposed to prove anything about when it was created?

[-] FaceDeer@kbin.social 3 points 1 year ago

You post it publicly somewhere that has a timestamp. A blockchain would be best because it can't be tampered with.

[-] lolcatnip@reddthat.com 1 points 1 year ago

Ah, I thought you were saying the hash proved something on its own. Lots of weird ideas about crypto in this thread.

[-] lemming741@lemmy.world 1 points 11 months ago

That proves it existed at a specific time in the past, not that it didn't exist before that. What's stopping a hash of the Mona Lisa on a block chain with today's date?

[-] FaceDeer@kbin.social 2 points 11 months ago

It also doesn't materialize ponies out of nothing. It can't do everything, but surely you can see that there are a lot of situations where being able to say with confidence that "this picture existed in exactly this form at exactly this date" is a super useful thing?

[-] lemming741@lemmy.world 1 points 11 months ago

It doesn't prove when it was created, only that it existed. Previous poster /u/lolcatnip is talking about creation date

[-] FaceDeer@kbin.social 2 points 11 months ago

And that's all I'm saying that it does.

As I said, it's not perfection for every possible application. But it is still highly useful in many applications.

[-] floofloof@lemmy.ca 2 points 1 year ago

Maybe each camera has a different public/private key?

[-] BitSound@lemmy.world 1 points 1 year ago* (last edited 1 year ago)

They would, but each camera's private key can be extracted from the hardware if you're motivated enough.

If Alice's fancy new camera has the private key extracted by Eve without Alice's knowledge, Eve can send Bob pictures that Bob would then believe are from Alice. If Bob finds out that Alice's key was compromised, then he has to guess as to whether any photo he got from Alice was actually from Eve. Having a public timestamp for the picture doesn't help Bob know anything, since Eve might've gone and created the timestamp herself without Alice's knowledge.

[-] floofloof@lemmy.ca 2 points 1 year ago* (last edited 1 year ago)

Still, unique keys for each camera would lessen the risk of someone leaking a single code that undermines the whole system, as happened with DVDs.

And if an interested party wanted to steal a camera's private key to fake an image's provenance they'd need to get physical access to that very camera. Perhaps a state-sponsored group could contrive this (or intervene during manufacturing), but it is a challenge and an even bigger challenge for everyone else.

[-] BitSound@lemmy.world 2 points 1 year ago

Physical access means all bets are off, but it's not required for these attacks. If it's got a way to communicate with the outside world, it can get hacked remotely. For example here's an attack that silently took over iphones without the user doing anything. That was used for real to spy on many people, and Apple is pretty good at security. Most devices you own such as cameras with wifi will likely be far worse security-wise.

[-] BitSound@lemmy.world -2 points 1 year ago

And Tom's camera gets hacked by an evil maid and then where are you? Exactly. This is snake oil.

[-] FaceDeer@kbin.social 4 points 1 year ago

Unless the evil maid is also capable of time travel there's no way for them to mess with the timestamps of things once they've been published. She could take some pictures with the camera but not tamper with ones that have already been taken.

[-] BitSound@lemmy.world -1 points 1 year ago

The evil maid could take a copy of a legitimate image, modify it, publish it, and say that the original image was faked. If there's a public timestamp of the original image, just say "Oh, hackers published it before I could, but this one is definitely the original". The map is not the territory, and the blockchain is not what actually happened.

Digital signatures and public signatures via blockchain solve nothing here.

[-] FaceDeer@kbin.social 4 points 1 year ago

The evil maid could take a copy of a legitimate image, modify it, publish it, and say that the original image was faked.

No she could not, the original image's timestamp has already been published. The evil maid has no access to the published data.

“Oh, hackers published it before I could, but this one is definitely the original”

And then the evil maid is promptly laughed out of the building by everyone who actually understands how this works. Your evil maid is depending on "trust me, bro" whereas the whole point of this technology is to remove the need for that trust.

[-] BitSound@lemmy.world -1 points 1 year ago* (last edited 1 year ago)

original image’s timestamp has already been published

"Oh the incorrect information was published, here's the correct info". Again, the map is not the territory.

the whole point of this technology is to remove the need for that trust.

And it utterly fails to achieve that here. I'll put it another way: You have this fancy camera. You get detained by the feds for some reason. While you're detained, they extract your private keys and publish a doctored image, purportedly from your camera. The image is used as evidence to jail you. The digital signature is valid and the public timestamp is verifiable. You later leave jail and sue to get your camera back. You then publish the original image from your camera that proves you shouldn't have been jailed. The digital signature is valid and the public timestamp is verifiable. None of that matters, because you're going to say "trust me, bro". Introducing public signatures via the blockchain has accomplished absolutely nothing.

You're trying to apply blockchain inappropriately. The one thing that publishing like this does is prove that someone knew something at that time. You can't prove that only that person knew something. You can prove that someone had a private key at time X, but you cannot prove that nobody else had it. You can prove that someone had an image with a valid digital signature at time X, but you cannot prove that it is the unaltered original.

[-] FaceDeer@kbin.social 2 points 1 year ago

“Oh the incorrect information was published, here’s the correct info”. Again, the map is not the territory.

And again, your "attack" relies on the evil maid saying "just trust me bro" and people taking her word on that. The "incorrect information" is provably published before the supposed "correct information" was.

The whole point of building this stuff into the camera is so that the timestamp can be published immediately. Snap the photo and within seconds the timestamp is out there. If the photographer doesn't have that enabled then he's not actually using the system as designed, so he shouldn't be surprised if it doesn't work right. If he uses it as designed then it will work.

The one thing that publishing like this does is prove that someone knew something at that time. You can’t prove that only that person knew something.

So? That's not the goal here.

[-] BitSound@lemmy.world 0 points 1 year ago

The “incorrect information” is provably published before the supposed “correct information” was.

Rephrased, some information was published before some other information. Sure, that's provable, but what of it? How do you know which is correct and which isn't? You're back to trust.

[-] FaceDeer@kbin.social 1 points 1 year ago* (last edited 1 year ago)

The labels "incorrect" and "correct" are what the evil maid is claiming. That's the "just trust me bro" part of your "attack." It's implausible in the extreme. If you're taking photos with a camera that's designed to publish a timestamp within seconds of the photo being taken, and days later some random person is claiming that the first photo was a "fake" but this new one they're just posting now is the real one they just didn't get around to posting until now, who in their right mind will believe that?

Sure, you can posit a situation where everyone is stupid and doesn't believe what the tech is telling them. The tech doesn't matter in a situation like that. Doesn't mean the tech is poorly designed, it just means that everyone in your posited scenario is stupid.

[-] BitSound@lemmy.world 2 points 1 year ago* (last edited 1 year ago)

It doesn't have to be a random person claiming that the first image is fake. You could get your private keys leaked, and then the attacker waits until you're on vacation in a remote area without wifi/cell, and then they publish an image and say "oh, i got wifi for a bit and published this". You then get back from vacation, see the fake image and claim that you didn't have any wifi/cell service the whole time and couldn't have published an image. Why should people trust you? Switch out vacation for "war zone" if you'd like for a relevant example. Right now many people in Gaza or Ukraine don't exactly have reliable ways to use the internet, and that's exactly the sort of situation where you'd want to be able to verify images.

Alternatively as I put in another comment, if it's got the ability to publish stuff straight from the camera, it's got the ability to be hacked and publish a fake image, straight from the camera.

Publishing things on the blockchain adds nothing here. The tech isn't telling anyone anything useful, because the map is not the territory.

These are not implausible scenarios. They wouldn't happen every day because they're valuable attack vectors, but they're 100% possible and would be saved to be used at the right time, like when it really matters, which is the worst possible time to incorrectly trust something.

[-] FaceDeer@kbin.social 0 points 11 months ago

It doesn’t have to be a random person claiming that the first image is fake.

Then we're no longer talking about an "evil maid" attack. I'm not going to engage in further goalpost-shifting, you're just adding and removing from the scenario arbitrarily and demanding that this system must satisfy every constraint you throw at it.

If you don't want to use this system, fine, don't use it. It's not for you.

[-] BitSound@lemmy.world 2 points 11 months ago

There's no goalpost-shifting, the evil maid is still getting your keys. I'm not sure what you're not getting here.

The point is that the system is useful for exactly nobody, because you still have to trust that someone hasn't had their private keys compromised via an evil maid attack, and publishing timestamps on a blockchain is irrelevant to the problem.

this post was submitted on 21 Nov 2023
161 points (91.3% liked)

Technology

59374 readers
4019 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS