this post was submitted on 21 Nov 2023
162 points (91.3% liked)

Technology

55964 readers
5087 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] floofloof@lemmy.ca 2 points 7 months ago (1 children)

Maybe each camera has a different public/private key?

[–] BitSound@lemmy.world 1 points 7 months ago* (last edited 7 months ago) (1 children)

They would, but each camera's private key can be extracted from the hardware if you're motivated enough.

If Alice's fancy new camera has the private key extracted by Eve without Alice's knowledge, Eve can send Bob pictures that Bob would then believe are from Alice. If Bob finds out that Alice's key was compromised, then he has to guess as to whether any photo he got from Alice was actually from Eve. Having a public timestamp for the picture doesn't help Bob know anything, since Eve might've gone and created the timestamp herself without Alice's knowledge.

[–] floofloof@lemmy.ca 2 points 7 months ago* (last edited 7 months ago) (1 children)

Still, unique keys for each camera would lessen the risk of someone leaking a single code that undermines the whole system, as happened with DVDs.

And if an interested party wanted to steal a camera's private key to fake an image's provenance they'd need to get physical access to that very camera. Perhaps a state-sponsored group could contrive this (or intervene during manufacturing), but it is a challenge and an even bigger challenge for everyone else.

[–] BitSound@lemmy.world 2 points 7 months ago

Physical access means all bets are off, but it's not required for these attacks. If it's got a way to communicate with the outside world, it can get hacked remotely. For example here's an attack that silently took over iphones without the user doing anything. That was used for real to spy on many people, and Apple is pretty good at security. Most devices you own such as cameras with wifi will likely be far worse security-wise.