Hacker Newsnew | comments | show | ask | jobs | submit login

".. if you are being photographed or filmed at your place of work, it may be sensible to remove any passwords which could appear in the background.. "

I've got some better advice. Don't stick passwords to the wall (or monitor) in the first place!




I see no problem with it. Securing a room is a known problem, and relatively easy to do, particularly in a military base. You have physical locks and guards. If you know that the people who have access to the room should also be able to access that part of the network, the physical security secures the network.

The username and password, then, keep out people who don't have access to that room.

-----


Well yes, securing the world is a known problem. Look at the other wall.

-----


Even with the actual document photochopped out, the credentials could still show in a mirror or monitor. Or maybe soon we'll be able to recreate missing parts of images by analyzing the ambient light distributions in the rest of the photo...

-----


Second option is rather unlikely, given how many unknowns you would be solving against (geometry of the seen, geometry of the not seen, incident light sources, camera response curve etc) from comparatively very little data (a continuous signal that is sampled and heavily quantized to just 8 bits per channel).

-----


Good point. We could reduce some of those unknowns by getting the original photograph (would have camera data in its metadata), and we could assume at least some of the light sources in the ceiling and through windows.

-----


Yes you can limit the problem until we can get something useful out of the other end but it is very very hard. Here is one of the latest works on the topic: "Accidental pinhole and pinspeck cameras: revealing the scene outside the picture" (Torralba & Freeman).

http://people.csail.mit.edu/torralba/publications/shadows.pd...

-----


It's actually a very clever way to seed access to their honeypot.

-----




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: