Hacker News new | past | comments | ask | show | jobs | submit login

That's cool, but it seems like building a trusted chain of custody from source/capture, to editing (where lots of assets will be combined/composited together), to distribution will be tricky.

Plus, how does one guarantee that light hitting the camera sensor hasn't already been manipulated?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: