Profile avatar
hackerfactor.bsky.social
Computer security specialist, forensic researcher, and founder of FotoForensics. Sleep is not necessary.
49 posts 78 followers 5 following
Regular Contributor
Active Commenter

The Hacker Factor Blog: C2PA and Authentication Updates hackerfactor.com/blog/index.p... C2PA won't stop fake IDs, BBC made their bad example worse, Microsoft's validation service is offline, and Truepic's gives bad results. But good news: UMBC is formally evaluating C2PA, SEAL, and related tech.

The Hacker Factor Blog: Safety in Numbers hackerfactor.com/blog/index.p... Simple tips to stay safe online when attending a protest.

The Hacker Factor Blog: Sign Here hackerfactor.com/blog/index.p... Don't trust signatures in PDF files. They are too easy to forge and alter.

The Hacker Factor Blog: Crashing Arizona's C2PA Pilot hackerfactor.com/blog/index.p... The Arizona Secretary of State released a pilot program that demonstrates C2PA signing. Every example demonstrates how C2PA does NOT work.

🧪 #StandForScience

Happy Superb Owl day.

The Hacker Factor Blog: ShmooCon and C2PA Forgeries www.hackerfactor.com/blog/index.p... At ShmooCon, Microsoft presented on C2PA but didn't address any of the problems. To demonstrate the ineffectiveness of C2PA, I walk through step-by-step how to create an authenticated forgery.

The Old Western "The Garamond brothers are back and they're going after the Courier," declared Arielle. "Don't worry," Roman replied. "The New Times reported that there's a new Serif in town."

The Hacker Factor Blog: Signed and SEALed hackerfactor.com/blog/index.p... SEAL can now digitally sign over two dozen different common file formats, including images, audio, video, and documents.

I keep hearing the lots of people are moving to Bluesky, but are people actually using it?

Adobe's study about the Adobe sponsored solution found that Adobe's users demand Adobe's solution. news.adobe.com/news/news-de... It's written by Adobe's Head of Responsible Innovative Communications, who is working on Adobe's C2PA and CAI. Yup, no bias in these findings! (sarcasm emoji: 💩)

The Hacker Factor Blog: C2PA from the Attacker's Perspective www.hackerfactor.com/blog/index.p... I recently participated in a panel discussion about C2PA. As part of the attacker's perspective, I demonstrated how to trivially alter C2PA's cryptographically signed time stamp.

The Hacker Factor Blog: Upcoming IPTC Conference Presentation. I'm on a panel taking about C2PA! Show up and ask questions! www.hackerfactor.com/blog/index.p...

The Hacker Factor Blog: The Jitter Bug Part 2 www.hackerfactor.com/blog/index.p... Finally figured out how to stop the random CPU crashes! (At least, I really think so this time.)

The Hacker Factor Blog: VIDA: The Simple Life www.hackerfactor.com/blog/index.p... A simple, free, and decentralized solution for media authentication. (A better solution than C2PA.)

The Hacker Factor Blog: Introducing: The Brick www.hackerfactor.com/blog/index.p...

The Hacker Factor Blog: Clear The DEC www.hackerfactor.com/blog/index.p...

The Hacker Factor Blog: The Great Kate Debate www.hackerfactor.com/blog/index.p...

The Hacker Factor Blog: IEEE, BBC, and C2PA www.hackerfactor.com/blog/index.p...

The Hacker Factor Blog: C2PA's Time Warp www.hackerfactor.com/blog/index.p...

I've been following some news feeds on BlueSky. However, many of them are for paywalled content. I've started muting any news account that posts clickbait headlines that link to a paywall. (First up? Financial Times ft.com .)

The Hacker Factor Blog: The Jitter Bug www.hackerfactor.com/blog/index.p...

The Hacker Factor Blog: 12 Years at FotoForensics www.hackerfactor.com/blog/index.p...

The Hacker Factor Blog: Save The Date www.hackerfactor.com/blog/index.p...

Okay, I'm here. Now what?