this post was submitted on 17 Jul 2023
163 points (98.8% liked)

Technology

58150 readers
4775 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

According to Wikipedia:

The goal of the C2PA is to define and establish an open, royalty-free industry standard that allows reliable statements about the provenance of digital content, such as its technical origin, its editing history or the identity of the publisher.

Has anyone explored this standard before? I'm curious about privacy implications, whether it's a truly open standard, whether this will become mandatory (by law or because browsers refuse to display untagged images), and if they plan on preventing people from reverse engineering their camera to learn how to tag AI-generated photos as if they were real.

you are viewing a single comment's thread
view the rest of the comments
[–] ramble81@lemmy.world 13 points 1 year ago (2 children)

I know Blockchain is always in search of a solution, but is this one place where it may work? Take a hash of the image and store that hash in a chain, that way you can always hash the image and see if it's been altered?

[–] zaplachi@lemmy.ca 13 points 1 year ago

Many CSAM detecting services already use image hashing to compare to a central database.

https://www.thorn.org/blog/hashing-detect-child-sex-abuse-imagery/

[–] xep@kbin.social 6 points 1 year ago (1 children)

What value does having a blockchain here provide, exactly?

[–] ramble81@lemmy.world 3 points 1 year ago (1 children)

Publicly traceable and verifiable hashes of the images authenticity. Submitting a hash of the image can prove who submitted it and when and then any altering of the image would yield a different hash which you would know you're not looking at the original image.

[–] xep@kbin.social 3 points 1 year ago

How would that functionally differ from having an authority verify these hashes? Certificate authorities already provide a similar service, and C2PA would likely work in a similar way, sans any effort to implement "trustlessness."