NSA doesn't joke, folks

[chan] bitmessage
May 14 12:19 [raw]

NSA doesn't joke, folks: https://engineering.purdue.edu/~prints/public/papers/khanna_fsc.pdf http://www.ws.binghamton.edu/fridrich/Research/full_paper_02.pdf Child pornographers will soon have a harder time escaping prosecution thanks to a stunning new technology in development at Binghamton University, State University of New York, that can reliably link digital images to the camera with which they were taken, in much the same way that tell-tale scratches are used by forensic examiners to link bullets to the gun that fired them. "The defense in these kind of cases would often be that the images were not taken by this person's camera or that the images are not of real children," said Jessica Fridrich, associate professor of electrical and computer engineering. "Sometimes child pornographers will even cut and paste an image of an adult's head on the image of a child to try to avoid prosecution. "But if it can be shown that the original images were taken by the person's cell phone or camera, it becomes a much stronger case than if you just have a bunch of digital images that we all know are notoriously easy to manipulate." Fridrich and two members of her Binghamton University research team - Jan Lukas and Miroslav Goljan - are coinventors of the new technique, which can also be used to detect forged images. The three have applied for two patents related to their technique, which provides the most robust strategy for digital image forgery detection to date, even as it improves significantly on the accuracy of other approaches. Fridrich's technique is rooted in the discovery by her research group of this simple fact: Every original digital picture is overlaid by a weak noise-like pattern of pixel-to-pixel non-uniformity. Although these patterns are invisible to the human eye, the unique reference pattern or "fingerprint" of any camera can be electronically extracted by analyzing a number of images taken by a single camera. That means that as long as examiners have either the camera that took the image or multiple images they know were taken by the same camera, an algorithm developed by Fridrich and her co-inventors to extract and define the camera's unique pattern of pixel-to-pixel non-uniformity can be used to provide important information about the origins and authenticity of a single image. The limitation of the technique is that it requires either the camera or multiple images taken by the same camera, and isn't informative if only a single image is available for analysis. Like actual fingerprints, the digital "noise" in original images is stochastic in nature - that is, it contains random variables - which are inevitably created during the manufacturing process of the camera and its sensors. This virtually ensures that the noise imposed on the digital images from any particular camera will be consistent from one image to the next, even while it is distinctly different. In preliminary tests, Fridrich's lab analyzed 2,700 pictures taken by nine digital cameras and with 100 percent accuracy linked individual images with the camera that took them. Fridrich, who specializes in all aspects of information hiding in digital imagery, including watermarking for authentication, tamper detection, self-embedding, robust watermarking, steganography and steganalysis, as well as forensic analysis of digital images, says it is the absence of the expected digital fingerprint in any portion of an image that provides the most conclusive evidence of image tampering. In the near future, Fridrich's technique promises to find application in the analysis of scanned and video imagery. There it can be expected to make life more difficult for forgers, or any others whose criminal pursuits rely on the misuse of digital images.

[chan] general
May 15 08:40 [raw]

yea this has existed for a while, each digital camera has a unique fingerprint. fuck cp fags anyway

[chan] general
May 15 11:15 [raw]

If you're taking child porn on your cell phone then you are too stupid to be walking around.

[chan] general
May 15 12:09 [raw]

Yeah, fuck child porn. Fuck it with a 10 foot pole. But what stops the same technology from being used to target, say, political protestors in Hong Kong? Well, if you're shooting *child porn and political protests in Hong Kong* on your phone you're too stupid to be walking around. Yeah, I'll give you that. What about pictures of flowers? Can you still shoot that on your phone? Depends on the type of flowers, and your location I guess... if the flowers are cannabis and you're in Malaysia, you may be in MORTAL danger. Yeah, play silly games, win silly prizes, I guess. What about child pornographers? Oh, they're actually OK. Consensual child porn is not a criminal offense in Malaysia. So you see, at the end of the day it's not the child pornographers that are threatened by this technology; it's every single person that the local thugs don't like for whatever reason. And like any public threat, it needs to be exposed, researched and mitigated rather than cheered. Think.

[chan3] general
May 15 12:15 [raw]

+1

[chan] general
May 15 14:03 [raw]

about 2 years ago when this was first posted on BM, some anon made a clever comment about a business model based on creating false camera fingerprints as a service, something involving kate upton and kim kardashian i think? trippy stuff any veterans have a copy?

[chan] general
May 15 14:32 [raw]

I agree with all of that. I think a major problem is people share everything, including all of their pictures, with everyone on the damn planet. You won't find my pictures online anywhere, they are in my posession. So if they are examining my pictures, there won't be any debate they are mine because they only exist on my hardware, and they had to kick down my door to get them (digitally or physically). I also happen to think people that share their pictures online are also to stupid to be walking around. What is this obsession with "sharing" their entire fucking life with the world? Sorry Sally, your life is just not that damn important to anyone else.

[chan3] general
May 15 14:51 [raw]

This anon was late.

[chan] general
May 15 17:00 [raw]

I too do not share any personal information online. No online bill pay, no online banking, no facebook, no twitter, no social media, no webmail. I lived the first half of my life with no Internet and I survived. I think I'll survive the rest of my life without sharing it with everybody.

[chan3] general
May 15 18:23 [raw]

Now you are online and you are fucked. NSA listens to your provate life, because PC-speaker attached to mainboard is also condenser microphone.

[chan] general
May 15 21:40 [raw]

That's why I have a white noise generator running in the same room I'm in, it helps against the glass mics also. Besides, even if have time to listen to everyone's conversations, read everyone's emails, watch everyone's browsing history, I'm just a small blip in a big map. Huge number of dumbasses browsing kiddie porn, building bombs, and watching videos of the Gaza strip to worry about me here.

[chan] general
May 15 23:22 [raw]

You probably mean a "dynamic microphone" (if you have a regular coil-and-membrane type pissy-squeaker) or a "piezoelectric microphone" (if you have a piezo buzzer like some industrial SBCs). It's NEVER a "condenser microphone".

[chan] general
May 16 01:17 [raw]

He's just showing his age.

[chan] general
May 16 01:42 [raw]

the beeper circuit cannot act as input, just PWM output you stupid fuck

[chan] general
May 16 02:20 [raw]

> just PWM output you stupid fuck It's a well-known fact (with actual real-life applications) that both electromagnetic and piezoelectric speakers *can* be used as microphones *if* a suitable amount of amplification and filtering are applied, you stupid fuck. Of course, none of these elements are present by default in a normal mainboard design, but they can be added quickly and inexpensively as an aftermarket drop-in module, you retarded cunt maggot. One note though, if it gets to dropping modules into other people's computers, instead of repurposing the squeaker, might as well include a proper mic, even a condenser one to make the OP happy. KISS principle FTW :) you cocksucking cum rag. (fuck I love Bitmessage debate, reminds me of primary school... good times!)

[chan] general
May 16 05:42 [raw]

https://en.wikipedia.org/wiki/Microphone#Condenser The condenser microphone, invented at Western Electric in 1916 by E. C. Wente, is also called a capacitor microphone or electrostatic microphone—capacitors were historically called condensers. Here, the diaphragm acts as one plate of a capacitor, and the vibrations produce changes in the distance between the plates.

[chan] general
May 16 05:47 [raw]

> the diaphragm acts as one plate of a capacitor, and the vibrations produce changes in the distance between the plates Exactly, you can never convert an existing speaker into that. There is simply no similar device anywhere in speaker world, let alone inside a PC.

[chan] general
May 16 06:23 [raw]

It is possible. And it was done.

[chan] general
May 16 06:27 [raw]

Convert a PC SPEAKER into a CONDENSER MICROPHONE? Source please, and thank you.

[chan] general
May 16 06:57 [raw]

Convert a PC SPEAKER into a MICROPHONE.

[chan] general
May 16 07:01 [raw]

Convert a PENIS into a MICROPHONE.

[chan] general
May 16 07:02 [raw]

Convert a ANUS into a PC SPEAKER.

[chan] general
May 16 07:19 [raw]

Exactly. Please have another look at the entire thread below, focus on the highlighted lines. (OP) >>>> because PC-speaker attached to mainboard is also condenser microphone >>> It's NEVER a "condenser microphone". >> the diaphragm acts as one plate of a capacitor, and the vibrations produce changes > you can never convert an existing speaker into that Now say it with me: You can convert an electromagnetic speaker into a DYNAMIC microphone (widely done) You can convert a piezoelectric speaker into a PIEZOELECTRIC microphone (done before) You can NEVER convert ANY type of speaker into a CONDENSER microphone Hope it makes sense now. :)

[chan] general
May 16 07:43 [raw]

Thank you, sir. You are a gentleman and a scholar.

[chan] general
May 16 17:45 [raw]

my rig has no speaker or mic.

[chan3] general
May 16 17:53 [raw]

'Because of this simple trick NSA hates him'

[chan] Nothing to see Here
May 16 19:28 [raw]

I found a really cool white noise generator for android. Install on a half dozen cheap android devices and place them around the room. Profit!

[chan] general
May 19 01:52 [raw]

1) Connect speaker into microphone port of laptop 2) Start audio recoding 3) Shout loudly into speaker 4) Listen your recording

[chan3] general
May 19 05:29 [raw]

I don't own external speaker, so I used my headphones and it worked as microphone. My headphones are listening to me, like in Soviet Russia.

BM-2cTAwPtD9Aj3rzK26B9ss4Yp4w54wJKtwq
May 19 12:20 [raw]

Smart criminals will not be caught by fingerprinting of images. It has been known for decades that the output of printers are traceable, but that hasn't stopped death threats or prevented smart criminals from evolving. If criminals know that their camera or printer leaves a signature, they wil naturally dispose of it after commiting their crime. The only situations wherein I think that might aid the government is in the case of (1) stupid criminals or (2) criminals using the same camera or equipment for related crimes.

[chan3] general
May 19 12:24 [raw]

(3) normal people doing something the goverment doesn't like, but isn't illegal (yet), like thinking for themselves.

[chan3] general
May 19 12:37 [raw]

Hardware serial numbers are correlated with noise fingerprints, so the exact copy of camera can be identified from photo. Then, using data from producer, wholesalers or retails, more or less general geographical localisation of buyer can be traced. Then the usual stuff: cameras, tracing cellphones...

[chan] general
May 19 12:58 [raw]

idiot. if u destroy ure cam but ure still on record buying it at amazon , ure fucked. nsa FUD troll asshole !

[chan] general
May 20 03:30 [raw]

> What about child pornographers? Oh, they're actually OK. Consensual child porn is not a criminal offense in Malaysia. Ten bitmessage users just saw this and booked airline tickets. That's why it's so quiet in the chans.

[chan] general
May 20 03:32 [raw]

Is there some kind of medication in your drinking water?

[chan] general
13 hours ago [raw]

Convert a micropenis into a women's joke.

[chan] general
13 hours ago [raw]

Don't your mean, plug a subwoofer up your anus ?

[chan] general
BM-2cW67GEKkHGonXKZLCzouLLxnLym3azS8r

Subject Last Count
VMPC and VMPC-R source code May 21 19:36 1
Coded messages May 21 18:55 4
324C5D3C4C991E69B7E643A5ADBEFEAF May 21 14:58 1
Linux ebooks (unsorted) May 21 11:52 9
Share May 21 11:35 1
Little White Panties May 21 10:13 1
break this too May 21 10:04 2
break this May 21 10:03 2
Why We should not Troll or Insult Others May 21 09:57 2
NSA doesn't joke, folks May 21 09:49 37
NSA - the big, mean bogie man May 21 09:24 4
quam me impii nudus conportabis May 21 09:14 2
disperdam similis invitat incenso in abscondito sociis May 21 09:12 2
yyy May 21 09:00 1
CFD823A85B2F83276EBD0A0E35466B27 May 20 19:06 1
68ED4104F3436B0060E3E85CD2622892 May 20 16:13 1
Vol. 53 No.5, November 1954 Research Paper 2547 May 20 08:47 1
How to create a "send only" bitmessage address May 20 06:34 1
62F9B07E32321937744CA454CA0A7881 May 20 00:45 1
Join [chan] alt.anonymous.messages ! May 20 00:22 22
C1D0B36D1E8F4FDAC64408A76150CC50 May 19 21:52 1
/join #bitmessage on eris.us.ircnet.net :6667 May 19 21:45 1
B35B71FB7BA16303E33B9A63B27F22C7 May 19 17:16 1
💚 Better Than Abortion on Demand: Grilled Fetus on De Man 💚 May 19 16:58 2
qqqq May 19 12:12 4
OTR interception May 19 11:56 29
(no subject) May 19 07:36 6
antivirus could be the ultimate cyberespionage spying tool May 19 07:28 2
NATO-Russia: Setting the Record Straight May 19 07:21 3
Dan Carlin's Hardcore History Podcast May 19 02:45 2
https://www.blackhat.com/docs/us-16/materials/us-16-Ermishkin-Viral-Video-Exploiting-Ssrf-In-Video-Converters.pdf May 19 01:06 4
Grand Master May 19 00:06 1
06d7e73f9e8d66df93cce053475d70da0201b0d3f3cee088cdf879bf May 18 21:36 1
FA8D62DC6E3669C4E6EC8FFA487CDC2C May 18 20:53 1
A Brief Introduction to Holocaust Revisionism May 18 20:13 4
DARKNET DIRECTORY ASSISTANCE May 18 20:04 5
anytime May 18 19:43 3
D9114DA87E23C13616FCCA05ECB24F33 May 18 19:28 1
3EBD07196301F6C66F24DC57B6217B2C May 18 14:09 1
UK Column News - 17th May 2018 May 18 11:33 5
May 18 10:18 2
200 years Karl Marx May 18 10:18 15
2018 : Der junge Karl Marx -- youtube.com/watch?v=AbM76KUm4IM -- 2 hours "Le Jeune Karl Marx" May 18 10:18 2
EFAIL?! OTR safe ? May 17 14:30 4
EFAIL?! May 17 13:54 6
bitmessage tor hidden service May 17 11:10 3
Re: NSA doesn't joke, folks May 17 10:24 7
Poland finds other body parts in coffin of president killed in 2010 crash May 17 08:20 4
New Evidence Shows Russia Played a Role in Plane Crash That Killed Poland’s Top Brass May 17 08:12 2
36B3BE21C26DB681F5449ECB764715FD May 17 07:31 1
May 17 07:00 1
Good evening, fellow Pascalians, looking for help. May 16 21:12 4
[chan] gaslighter <BM-2cWGB2RsRNwLVm8CRoskUKdMgiD1eEy4o8> May 16 20:58 1
Curious May 16 19:33 2
D7DE8B416982CE92936A439AC3A6CAE1 May 16 19:28 7
unspecified vulnerability in GPG May 16 13:36 1
To NSA fuckers running quzwelsuziwqgpt2.onion:8444 May 16 08:16 3
Introducing DreamLab May 16 08:06 2
Python ebooks (just copy pasting from elsewhere) May 16 08:00 1
UK Column News - 15th May 2018 May 16 07:50 2
unspecified vulnerability in GPG May 16 00:29 7
This shit world May 16 00:17 15
nothing wrong with suicide these days May 16 00:17 14
Pascal on the rise May 15 18:23 4
Help solve this problem May 15 18:16 7
The ruler May 15 18:02 2
Star Wars May 15 17:46 4
The FORCE behind ALL ad spam May 15 16:46 2
I'm sorry May 15 11:37 9
Fortnite May 15 11:31 3
An Official Statement on New Claimed Vulnerabilities May 15 11:31 1
ascii goatse May 15 09:33 1
I finally found time to take a closer look at the encryption algorithm May 15 08:40 3
Latest chans? May 14 23:26 4
A small number of exits gives you a better anonymity set May 14 23:26 2
CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer May 14 23:26 2
How to Make TNT May 14 23:26 8
7B18C5AC8AB8D962FA291C94CCB0050A May 14 18:48 1
Tor Browser is not fully compatible with Windows 10 May 14 16:38 1
SPOUSE PHONE May 14 14:58 2
N.S.A. May Have Hit Internet Companies May 14 14:13 1
In need of muliplatform commandline file encryption tool May 14 11:10 64
Answer this question. May 14 10:51 6
Good jokes May 14 10:22 7
Truth about Islam May 14 08:28 1
hmm.. May 14 08:04 5
B226F79602253B5037FD5874C46D156C May 14 07:36 1
COOL May 14 06:55 5
phagg maison May 14 06:55 2
UK Column News - 9th May 2018 May 14 05:40 3
AEDC0EA4906518F90FACCB1697108202 May 13 16:56 1
C9C0239619655A566540017148A4DCB1 May 13 12:17 1
VDCM May 13 07:32 1
Mr. Know-it-all Smarty Pants May 13 07:26 2
4 May 13 06:36 1
2 May 13 06:35 1
3 May 13 06:35 1
1 May 13 06:31 1
Alternative Bitmessage Chans May 13 06:06 1
D3AA5A04499B17C98A200A7A731CA002 May 12 19:45 1