Hacker News new | past | comments | ask | show | jobs | submit login

They can't, ultimately, it's basically just DRM but in reverse.

I'm sure they can make it hard, with secure silicon etc., but they'll never make it impossible and that somewhat defeats the purpose.




The private keys in credit cards (the ones with chips) are pretty secure. I'm no aware of them being extractable.


I'm sure they're not extractable at scale, otherwise we'd have heard about it, but they're almost certainly extractable on a one-off basis if you have a big enough budget (one that likely outweighs whatever you'd stand to gain from it). It's just not the low hanging fruit of the system as a whole.

I also expect it not to be the low-hanging fruit of these cameras, but it is still one possible attack vector.


It still serves a legal purpose, as long as it's difficult enough. If you need to physically modify the device to access the keys, then bringing the unmodified device to court should be enough to verify legitimacy of the signature.


Since when are we taking photojournalists and social media users to court to verify each image?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: