0xD

joined 1 year ago
[–] 0xD@infosec.pub 3 points 9 months ago (3 children)

It's not really CSAM if there is no abuse happening, is it?

[–] 0xD@infosec.pub 9 points 9 months ago

That's really clever, you finally got me to dislodge this turd. Thank you!

[–] 0xD@infosec.pub 2 points 9 months ago

For me it will be the same as my "public" online presence, but not the more anonymous ones.

[–] 0xD@infosec.pub 10 points 9 months ago (1 children)

I'll be talking about digital signatures which is the basis for such things. I assume basic understanding of asymmetric cryptography and hashing.

Basically, you hash the content you want to verify with a secure hashing function and encrypt the value with your private key. You can now append this encrypted value to the content or just release it alongside it.

To now verify this content they can use your public key to decrypt your signature and get the original hash value, and compare it to their own. To get that, they just need to hash the content themselves with the same function.

So by signing their videos with the white house private key and publishing their public key somewhere, you can verify the video's authenticity like that.

For a proper understanding check out DSA :)

[–] 0xD@infosec.pub 5 points 9 months ago

Hope you find something to fulfill your wish!

[–] 0xD@infosec.pub 4 points 9 months ago (1 children)
[–] 0xD@infosec.pub 5 points 9 months ago* (last edited 9 months ago)

I work in exactly this field and I can go to work in shorts and a tank top because it's about my expertise, not the material or its form I choose to wear. I had to go to work in a suit in a previous job and I'll never ever accept that again.

[–] 0xD@infosec.pub 1 points 9 months ago* (last edited 9 months ago) (1 children)

Hacking is too complex to be automated like that - for now at least. Especially the AI buzzword is useless in this context. There are a lot of attempts to automate the process, but none of them come close to manual review by an experienced professional.

[–] 0xD@infosec.pub 9 points 9 months ago

Removing those draconic entry requirements would be a start.

view more: ‹ prev next ›