• LUHG
    link
    fedilink
    English
    -68 months ago

    Your initial comment said you feel like it’s a band aid or spam. It’s cryptography. It’s not a lock waiting to be picked. It’s a fantastic start.

    • @aax@lemmy.world
      link
      fedilink
      English
      108 months ago

      It literally is a lock waiting to get picked. The keys have to be somewhere on the device to create the signature of the photo. This can be reverse engineered, although it may not be trivial.

      • LUHG
        link
        fedilink
        English
        -38 months ago

        Seriously, if cryptography can be reverse engineered we have a big fucking problem and photography will be the least of our issues.

        • 2xsaiko
          link
          fedilink
          English
          38 months ago

          So you’re saying there’s never been an instance of private keys getting leaked or extracted ever? And there’s probably easier ways to break this than trying to extract the keys, especially if they’re in some kind of secure chip. People can get the hardware, they can do whatever they want to it. Of course it’s most likely going to be a lot harder than copying someone’s SSH keys off a hard drive.

        • @aax@lemmy.world
          link
          fedilink
          English
          38 months ago

          It’s clear you don’t have a great understanding of how this works. You don’t have to break cryptography. You simply need to extract the cryptographic keys from the device and then reverse the algorithm it uses to create the sig of the photos.

          • LUHG
            link
            fedilink
            English
            -38 months ago

            Simply. Mate, what are you smoking?

    • Fat Tony
      cake
      link
      fedilink
      English
      28 months ago

      Well I appreciate your optimism. Let’s hope you’re right.