<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
<div class="moz-cite-prefix">On 04/10/2025 04:00, John K Clark
wrote:<br>
</div>
<blockquote type="cite"
cite="mid:mailman.107.1759546817.17630.extropy-chat@lists.extropy.org">
<h1 style="font-family:arial,helvetica,sans-serif">Bottom line</h1>
<p style="font-family:arial,helvetica,sans-serif">Yes, you can
make video files that are <strong>cryptographically provably</strong> the
exact bytes a camera produced at a claimed time and place —
provided the camera’s hardware, firmware, and the ecosystem
(PKI, witnesses, anti-spoofing) are trustworthy. That system
raises the bar substantially against deepfakes and post-capture
edits, but it is <strong>not</strong> a perfect silver bullet:
attackers who compromise keys, firmware, or the capture process
itself (staging, spoofing) can still produce convincing fakes.
Strong system design (secure hardware, external witnesses,
anti-spoofing, and audited procedures) is required to make such
proofs robust in practice.</p>
<hr style="font-family:arial,helvetica,sans-serif"></blockquote>
<br>
<br>
So would it be fair to say that it's possible, but not really
practical for most purposes, but would actually be extremely useful
to certain regimes interested in 'proving' that their propaganda is
in fact true, and in plausibly discrediting services like BBC
Verify, etc.?<br>
<br>
<pre class="moz-signature" cols="72">--
Ben</pre>
</body>
</html>