this post was submitted on 14 Jun 2025
555 points (97.6% liked)

Greentext

6494 readers
985 users here now

This is a place to share greentexts and witness the confounding life of Anon. If you're new to the Greentext community, think of it as a sort of zoo with Anon as the main attraction.

Be warned:

If you find yourself getting angry (or god forbid, agreeing) with something Anon has said, you might be doing it wrong.

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Valmond@lemmy.world 1 points 12 hours ago (1 children)

This is for restricting use, not proving authenticity of the videos recording. Anyone can spin up keys and sign videos, so in a legal battle it would be worthless.

[–] Taleya@aussie.zone 2 points 12 hours ago* (last edited 8 hours ago) (1 children)

The technology would be extremely easy to adapt, with the certs being tied to the original recording equipment hardware. Given i don't see a $60 ip cam having a dolphin board it would probably be relegated to much higer end equipment, but any modification with a new key would break the chain of veracity

[–] Valmond@lemmy.world 0 points 10 hours ago (2 children)

This is blatantly not true, it would be extremely simple to circumvent. How do you "tie" the cert to a specific hardware without trusting manufacturers? You just can't, it's like putting a padlock on a pizzabox.

[–] Taleya@aussie.zone 2 points 8 hours ago (1 children)

I literally explained earlier how this exact technology is used in digital cinema dude c'mon.

[–] Valmond@lemmy.world 1 points 7 hours ago* (last edited 7 hours ago)

That doesn't mean it's useful for forensics, IMO.

Edit: not saying it wont be though, just that it's not as bullet proof as you'd think, IMO.

[–] Rossphorus@lemmy.world 1 points 1 hour ago

As with everything, trust is required eventually. It's more about reducing the amount of trust required than removing it entirely. It's the same with HTTPS - website certificates only work if you trust the root certificate authorities, for example. Root manufacturer keys may only be certified if they have passed some level of trust with the root authority/authorities. Proving that trust is well-founded is more a physical issue than an algorithmic one. As it is with root CAs it may involve physical cybersecurity audits, etc.