this post was submitted on 21 Nov 2023
0 points (NaN% liked)

Technology

59448 readers
3609 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 8 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 1 year ago (2 children)

Ah, DRM for your photos.

Great.

[–] [email protected] -1 points 1 year ago

This isn't DRM. I can't believe you have so many upvotes for such blatant FUD.

[–] [email protected] 0 points 1 year ago (2 children)

Not at all. From what I understand of this article, it wouldn't stop you from doing anything you wanted with the image. It just generates a signed certificate at the moment the picture is taken that authenticates that that particular image existed at that particular time. You can copy the image if you like.

[–] [email protected] 1 points 1 year ago (1 children)

This is an adorable show of optimism.

[–] [email protected] -1 points 1 year ago

🙄

Digital signatures are not nefarious. Quit freaking out about things just because you don't understand them.

[–] [email protected] 1 points 1 year ago

Forgive the cynicism, but: free, for now.

What happens when the company decides all of a sudden to lock the service behind a subscription pay wall?

Do you still maintain rights to your photos when you use this service?

[–] [email protected] -1 points 1 year ago

I was wondering when crypto content would become a thing like this.

[–] [email protected] 1 points 1 year ago

This is tilting at windmills. If someone has physical possession of a piece of hardware, you should assume that it's been compromised down to the silicon, no matter what clever tricks they've tried to stymie hackers with. Also, the analog hole will always exist. Just generate a deepfake and then take a picture of it.