@trevortimm Also need: ability to immediately cloud upload, with verified metadata. This photo WAS taken on time X; GPS Y.
-
-
Encryption is fine, but they will torture password out of people if they have access to camera/person.
-
Big question facing documenting abuse by power today is: how to defend veracity of what you do document. /end
End of conversation
New conversation -
-
-
@thegrugq Bruce Schneier described the authentication process long ago: https://www.schneier.com/academic/archives/1996/12/an_authenticated_cam.html …Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.