this post was submitted on 14 Jun 2025
622 points (97.8% liked)

Greentext

6628 readers
1708 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Rossphorus@lemmy.world 15 points 2 weeks ago (23 children)

Video evidence is relatively easy to fix, you just need camera ICs to cryptographically sign their outputs. If the image/video is tampered with (or even re-encoded) the signature won't match. As the private key is (hopefully!) stored securely in the hardware IC taking the photo/video, any generated images or videos can't be signed by such a private key.

[–] IlovePizza@lemmy.world 1 points 2 weeks ago (1 children)

Wouldn't this be as easy to break as to point a camera at a screen playing whatever you want?

Perhaps not with light field cameras. But then you could probably tamper with the hardware somehow.

[–] sus@programming.dev 3 points 2 weeks ago* (last edited 2 weeks ago)

getting the picture to perfectly replicate the image on the screen without it being noticeable that it's just a picture of a screen would be so difficult it would probably be easier to modify the camera instead

load more comments (21 replies)