Conversation

Replying to
People are going to increasingly lose trust in video as a form of evidence. If it doesn't conform to your biases, it must be fake. If it does fit what you think, it's real. It's another step towards people living in completely different realities based on how they see the world.
2
4
Replying to
For many people, definitely. I don't look forward to increasingly not being able to figure out the objective reality myself though. It's also a bit scary to think about how things like this are going to impact policing, trials, etc. when video increasingly can't be trusted.
2
1
Replying to
former: i'm not immune to propaganda already. it gets quantitatively worse, but probably not qualitatively latter: that's what bothers me most about them, yeah
1
2
Replying to
It's definitely possible to use attestation for this, even with existing technology today like Android key attestation. However, as I mentioned in another thread we had about this, attestation based on chaining to a known intermediate or root is a weak form vs. strong pairing.
1
2
Replying to and
I also don't feel that it should be treated as something that's nearly impossible to overcome by someone with physical access. It would be expensive, and there's probably the value in substantially raising the bar for this, but it could still be bypassed given enough money.
1
1
Replying to and
I'm not so sure that powerful and rich organizations still being able to do it while taking it away from the masses is a positive thing. That can already be today today with a camera app using Android key attestation and relying on the weak chaining to the known Google root.
1
1
Replying to and
The API supports chaining trust through the OS to the app. If you can exploit the OS, you can bypass OS enforced checks, but the signed attestation data includes the patch level which is a mitigating factor. It can definitely already be used for this today despite the weaknesses.
2
1
Replying to
i'm not sure if i would trust any of the existing SoCs here. attestation built into sensor silicon is a different question, but that raises more questions, like what do we do with compression
2
1
Replying to
the reason i'm saying "sensor silicon" is that we have an ability to embed a OTP ROM on silicon that not readable by SEM or STM directly and isn't susceptible to contrast etching
1
2
Replying to and
unfortunately i don't trust any of the silicon vendors to do everything else right and it would probably be possible to bypass it even if you use unique keys and post it to some kind of CT-style log
2