Hacker News new | past | comments | ask | show | jobs | submit login

How do cryptographic tools help against fake imagery?



Trusted hardware running remotely-attested trusted software can capture imagery that can be highly assured to be real.

Trusted timestamping, when correctly implemented, completely prevents the generation of imagery after-the-fact. Any false imagery would need to be pre-prepared prior to an event in time, or generated in real time. And a trusted device would need to be exploited to "record" it.

PKI allows individuals/organizations/governments to cryptographically associate their reputation with specific pieces of content.

There will always be the possibility of exploitation of trusted hardware. Apple's eternal fight against the jailbreak scene is evidence of this. However, the combination of these techniques would go a long way towards making the production and distribution of fake imagery difficult.

But, as already stated, the actual problem is societal. People don't really care that much, and enjoy living in their echo chambers.


See “Using ZK Proofs to Fight Disinformation”

https://medium.com/@boneh/using-zk-proofs-to-fight-disinform...


They allow people generating fake images to sign them so that people believe they are human-generated.

Oh, sorry. I meant "They allow independent sources of truth to do the meticulous work of validating the pedigree of creations, so that with their cryptographically-secured seal you can be confident a human originated the content and a human authenticated it. Only after such work is done would a work be cryptographically signed as authentic."

You know, just like you can always trust the presence of an SSL certificate means a site is who they say they are. /s


Hmmm, how does "trusted timestamping" and "remote attestation" fit into your assumption?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: