You are viewing a single thread.
View all comments View context
5 points

The hash would (hopefully) be authenticated. If you want to google it, search for “HMAC”.

This is assuming that the local key doesn’t get leaked, which is assuming a lot.

permalink
report
parent
reply
2 points

Aren’t these hardware keys unusable outside the hardware?

You’d need to somehow have the AI authenticate the image through the cameras hardware to use it.

Still possible though.

permalink
report
parent
reply
3 points

It’ll probably be stored in something like a TPM, whose primary purpose is to make intact extraction of the keys difficult or impossible. A few keys might become compromised but in this scenario (unlike DRM decryption) it’s easy to ignore those keys. There’s always the chance an exploit becomes available and is more widely used, though, in which case it would definitely be less valuable.

permalink
report
parent
reply

cute dogs, cats, and other animals

!aww@lemmy.ml

Create post

Community stats

  • 718

    Monthly active users

  • 815

    Posts

  • 1.7K

    Comments

Community moderators