Hacker News new | past | comments | ask | show | jobs | submit login
C2PA from the Attacker's Perspective (hackerfactor.com)
20 points by todsacerdoti 3 months ago | hide | past | favorite | 2 comments



Thanks for helping to highlight how hard it is to track cloned/fake images.

BTW I guess 'watermarks' can be easily scrambled; add noise, filters, &/or recompress into another image format (eg JPEG -> AVIF).


>Now, change this string to something within the date range. For the demo, I backdated it by two months, to March 11: "20240311143900Z". Save the file and upload Gorilla-edit.jpeg to Content Credentials. Poof! The authoritative cryptographic signature says it was created two months earlier. C2PA says there is no indication of tampering.

wtf? It looks like either the date itself isn't signed, or that the validation service doesn't bother validating the date is signed? Later on it says

>This isn't a code problem, this is a standards definition issue.

But it's not clear why the timestamp can't be validated. The timestamping infrastructure used for Windows authenticode signatures seem to work fine. Why can't the C2PA get their timestamping scheme to work?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: