NSA doesn't joke, folks

[chan] bitmessage
May 14 12:16 [raw]

NSA doesn't joke, folks: https://engineering.purdue.edu/~prints/public/papers/khanna_fsc.pdf http://www.ws.binghamton.edu/fridrich/Research/full_paper_02.pdf Child pornographers will soon have a harder time escaping prosecution thanks to a stunning new technology in development at Binghamton University, State University of New York, that can reliably link digital images to the camera with which they were taken, in much the same way that tell-tale scratches are used by forensic examiners to link bullets to the gun that fired them. "The defense in these kind of cases would often be that the images were not taken by this person's camera or that the images are not of real children," said Jessica Fridrich, associate professor of electrical and computer engineering. "Sometimes child pornographers will even cut and paste an image of an adult's head on the image of a child to try to avoid prosecution. "But if it can be shown that the original images were taken by the person's cell phone or camera, it becomes a much stronger case than if you just have a bunch of digital images that we all know are notoriously easy to manipulate." Fridrich and two members of her Binghamton University research team - Jan Lukas and Miroslav Goljan - are coinventors of the new technique, which can also be used to detect forged images. The three have applied for two patents related to their technique, which provides the most robust strategy for digital image forgery detection to date, even as it improves significantly on the accuracy of other approaches. Fridrich's technique is rooted in the discovery by her research group of this simple fact: Every original digital picture is overlaid by a weak noise-like pattern of pixel-to-pixel non-uniformity. Although these patterns are invisible to the human eye, the unique reference pattern or "fingerprint" of any camera can be electronically extracted by analyzing a number of images taken by a single camera. That means that as long as examiners have either the camera that took the image or multiple images they know were taken by the same camera, an algorithm developed by Fridrich and her co-inventors to extract and define the camera's unique pattern of pixel-to-pixel non-uniformity can be used to provide important information about the origins and authenticity of a single image. The limitation of the technique is that it requires either the camera or multiple images taken by the same camera, and isn't informative if only a single image is available for analysis. Like actual fingerprints, the digital "noise" in original images is stochastic in nature - that is, it contains random variables - which are inevitably created during the manufacturing process of the camera and its sensors. This virtually ensures that the noise imposed on the digital images from any particular camera will be consistent from one image to the next, even while it is distinctly different. In preliminary tests, Fridrich's lab analyzed 2,700 pictures taken by nine digital cameras and with 100 percent accuracy linked individual images with the camera that took them. Fridrich, who specializes in all aspects of information hiding in digital imagery, including watermarking for authentication, tamper detection, self-embedding, robust watermarking, steganography and steganalysis, as well as forensic analysis of digital images, says it is the absence of the expected digital fingerprint in any portion of an image that provides the most conclusive evidence of image tampering. In the near future, Fridrich's technique promises to find application in the analysis of scanned and video imagery. There it can be expected to make life more difficult for forgers, or any others whose criminal pursuits rely on the misuse of digital images.

[chan] bitmessage
May 14 23:26 [raw]

All consumer printers print microscopic dots on the pages that encode the serial number of the printer. It is to be assumed that networked printers also print the hostname, gateway, and IP address on each page in these microscopic encodings. This allows law enforcement or state censors to trace the origin of a page.

[chan] bitmessage

Subject Last Count
BM-2cWkFSxB4cyeNVr99tgJdkMA2nfivbXLiH May 25 07:07 2
minimum difficulty for chans May 25 05:51 6
ein kleines pyBM Nebenproblem in KDE LiquidShell May 24 18:14 1
PyBitmessage blacklist whitelist May 24 06:29 6
Test DML May 24 02:18 1
Now, following my own advice, adding channel bitmessage and general to the blacklist May 23 15:50 9
hyperboria node [fc5b:acf7:9762:439c:394d:02bb:d603:05de]:8444 May 23 01:34 3
Feature request: delete all messages from user May 22 10:46 2
(no subject) May 22 06:46 7
Github Wiki complaint May 21 08:49 12
EFAIL?! May 21 08:25 26
ERROR - Error Processing May 21 08:25 3
Curious May 21 02:17 32
Is bitmessage within whonix bad? May 20 21:24 14
Duplicate messages May 20 21:08 1
Download of Windows binary from Bitmessage.org May 20 07:25 3
How to create a "send only" bitmessage address May 20 04:35 1
/join #bitmessage on eris.us.ircnet.net :6667 May 19 21:46 3
hey - why not make pyBM as shitty as "Signal-App" by Marlinspike ? May 19 20:30 7
use Claws mail-App with pyBM and python May 19 20:28 5
A question May 18 23:24 2
A Few Bitmessage Internals for New Users May 18 23:08 5
May 18 17:33 1
Ideas for countering trolls and spam May 18 12:54 98
Broadcast messages May 17 23:24 24
2018 : Der junge Karl Marx -- youtube.com/watch?v=AbM76KUm4IM -- 2 hours "Le Jeune Karl Marx" May 17 20:24 1
Signal-App is complete shit May 17 20:24 13
May 17 19:49 2
OTR interception May 17 18:00 3
auto renew one's canary using broadcast or [chan] ? May 17 10:51 1
latest in the spy world May 16 14:14 3
Curious -- GUIfied pyBM-CLI May 16 13:47 1
efail vulns May 16 13:21 1
how does the namecoin feature work? May 16 07:24 3
Email campaign to promote Bitmessage? May 15 18:09 1
NSA doesn't joke, folks May 14 23:26 2
Beaker May 14 19:27 1
Bitmessage Bug - Re: Now, following my own advice, adding channel bitmessage and general to the blacklist May 14 16:21 3
Ideas for countering trolls and spam - technology. May 14 16:21 9
BITMESSAGE May 14 14:58 2
BM in firejail May 14 14:24 1
Team Revenge May 14 09:54 1
What are these messages? May 13 07:57 8
Bitmessage Bug? May 10 19:59 1
TOR -> VPN -> TOR May 10 14:57 2
Bitmessage on Raspi May 10 09:32 2
Bloom Filter for Routing May 10 09:04 1
Alternative treatment of Bitmessage addresses for use as public channels May 9 16:12 4
deterministic passphrases May 8 16:54 21
nothing wrong with suicide these days May 8 10:30 2
What's Peter Todd's public key? May 8 10:27 7
BMinstallMenu - easy download + run Bitmessage from py source in one single menu May 8 08:46 1
BMinstallMenu - easy download + run Bitmessage from py source in one single menu May 7 18:38 2
Why there are so many alternative Bitmessage implementations? May 7 18:31 14
modding pyBM May 7 18:17 4
bm hidden service settings May 7 10:48 1
bitmessage feature proposal May 7 10:38 1
This shit world May 7 07:22 2
Outgoing connections May 7 04:53 2
"time to live" ? May 7 03:27 2
OTR on Bitmessage May 7 02:06 31
Newbies! READ ME! (Bitmessage Primer) May 7 00:43 1
For Bitmessage Devs - GUI Interface Design May 6 23:18 1
O M E G A May 6 19:14 14
Bitmessage being sandbagged? May 6 05:55 3
Is Peter Surda around? Why stop signing technical messages? May 5 22:40 3
How to decrypt past objects? May 5 08:18 14
PyBM Error - no sufficient space in / partition but /home have lot's of free space May 4 13:42 3
Anybody seen this error before? May 4 12:58 4
<h1>HTML tags are enabled in subject tooltips</h1> May 3 22:17 3
is that right? May 3 07:33 6
RE: pyinstaller binaries do not run May 2 07:37 1
RE: hidden chan? May 1 06:05 1
hidden chan? Apr 30 16:15 2
bitmessage takes long to connect and finds only few peers Apr 29 10:54 2
pyinstaller binaries do not run Apr 29 09:43 3
ready-made Linux distro with BM included via TOR : "Merlot" Apr 29 09:27 1