• Fat Tony
    link
    fedilink
    English
    632 years ago

    Why do I feel like everytime I hear news such as: “Thing will fight against A.I.” Is either a scam or a bandaid to a flood.

    I don’t mean to be negative. But fighting software with software, like this, feels like a cat and mouse game.

    • @[email protected]
      link
      fedilink
      English
      172 years ago

      I also want my camera to give the best representation of the object I photograph.
      If I want post processesing done, I will do it later.

    • LUHG
      link
      fedilink
      English
      42 years ago

      Did you read the article? Even a little of it?

      • Fat Tony
        link
        fedilink
        English
        16
        edit-2
        2 years ago

        I’m not quite sure what you’re getting at. The basic idea is to be able to easily trace back wether or not a photo has been edited, as well as provide some level of proof the photo is authentic. However this is just a lock waiting to get picked to me. Hence my cat and mouse analogy.

        • LUHG
          link
          fedilink
          English
          22 years ago

          Your initial comment said you feel like it’s a band aid or spam. It’s cryptography. It’s not a lock waiting to be picked. It’s a fantastic start.

          • Fat Tony
            link
            fedilink
            English
            22 years ago

            Well I appreciate your optimism. Let’s hope you’re right.

          • @[email protected]
            link
            fedilink
            English
            102 years ago

            It literally is a lock waiting to get picked. The keys have to be somewhere on the device to create the signature of the photo. This can be reverse engineered, although it may not be trivial.

            • LUHG
              link
              fedilink
              English
              12 years ago

              Seriously, if cryptography can be reverse engineered we have a big fucking problem and photography will be the least of our issues.

              • dblsaiko
                link
                fedilink
                English
                32 years ago

                So you’re saying there’s never been an instance of private keys getting leaked or extracted ever? And there’s probably easier ways to break this than trying to extract the keys, especially if they’re in some kind of secure chip. People can get the hardware, they can do whatever they want to it. Of course it’s most likely going to be a lot harder than copying someone’s SSH keys off a hard drive.

              • @[email protected]
                link
                fedilink
                English
                32 years ago

                It’s clear you don’t have a great understanding of how this works. You don’t have to break cryptography. You simply need to extract the cryptographic keys from the device and then reverse the algorithm it uses to create the sig of the photos.

                • LUHG
                  link
                  fedilink
                  English
                  12 years ago

                  Simply. Mate, what are you smoking?