May 14 12:19 [raw]
NSA doesn't joke, folks: https://engineering.purdue.edu/~prints/public/papers/khanna_fsc.pdf http://www.ws.binghamton.edu/fridrich/Research/full_paper_02.pdf Child pornographers will soon have a harder time escaping prosecution thanks to a stunning new technology in development at Binghamton University, State University of New York, that can reliably link digital images to the camera with which they were taken, in much the same way that tell-tale scratches are used by forensic examiners to link bullets to the gun that fired them. "The defense in these kind of cases would often be that the images were not taken by this person's camera or that the images are not of real children," said Jessica Fridrich, associate professor of electrical and computer engineering. "Sometimes child pornographers will even cut and paste an image of an adult's head on the image of a child to try to avoid prosecution. "But if it can be shown that the original images were taken by the person's cell phone or camera, it becomes a much stronger case than if you just have a bunch of digital images that we all know are notoriously easy to manipulate." Fridrich and two members of her Binghamton University research team - Jan Lukas and Miroslav Goljan - are coinventors of the new technique, which can also be used to detect forged images. The three have applied for two patents related to their technique, which provides the most robust strategy for digital image forgery detection to date, even as it improves significantly on the accuracy of other approaches. Fridrich's technique is rooted in the discovery by her research group of this simple fact: Every original digital picture is overlaid by a weak noise-like pattern of pixel-to-pixel non-uniformity. Although these patterns are invisible to the human eye, the unique reference pattern or "fingerprint" of any camera can be electronically extracted by analyzing a number of images taken by a single camera. That means that as long as examiners have either the camera that took the image or multiple images they know were taken by the same camera, an algorithm developed by Fridrich and her co-inventors to extract and define the camera's unique pattern of pixel-to-pixel non-uniformity can be used to provide important information about the origins and authenticity of a single image. The limitation of the technique is that it requires either the camera or multiple images taken by the same camera, and isn't informative if only a single image is available for analysis. Like actual fingerprints, the digital "noise" in original images is stochastic in nature - that is, it contains random variables - which are inevitably created during the manufacturing process of the camera and its sensors. This virtually ensures that the noise imposed on the digital images from any particular camera will be consistent from one image to the next, even while it is distinctly different. In preliminary tests, Fridrich's lab analyzed 2,700 pictures taken by nine digital cameras and with 100 percent accuracy linked individual images with the camera that took them. Fridrich, who specializes in all aspects of information hiding in digital imagery, including watermarking for authentication, tamper detection, self-embedding, robust watermarking, steganography and steganalysis, as well as forensic analysis of digital images, says it is the absence of the expected digital fingerprint in any portion of an image that provides the most conclusive evidence of image tampering. In the near future, Fridrich's technique promises to find application in the analysis of scanned and video imagery. There it can be expected to make life more difficult for forgers, or any others whose criminal pursuits rely on the misuse of digital images.
May 15 08:40 [raw]
yea this has existed for a while, each digital camera has a unique fingerprint. fuck cp fags anyway
May 15 11:15 [raw]
If you're taking child porn on your cell phone then you are too stupid to be walking around.
May 15 12:09 [raw]
Yeah, fuck child porn. Fuck it with a 10 foot pole. But what stops the same technology from being used to target, say, political protestors in Hong Kong? Well, if you're shooting *child porn and political protests in Hong Kong* on your phone you're too stupid to be walking around. Yeah, I'll give you that. What about pictures of flowers? Can you still shoot that on your phone? Depends on the type of flowers, and your location I guess... if the flowers are cannabis and you're in Malaysia, you may be in MORTAL danger. Yeah, play silly games, win silly prizes, I guess. What about child pornographers? Oh, they're actually OK. Consensual child porn is not a criminal offense in Malaysia. So you see, at the end of the day it's not the child pornographers that are threatened by this technology; it's every single person that the local thugs don't like for whatever reason. And like any public threat, it needs to be exposed, researched and mitigated rather than cheered. Think.
May 15 12:15 [raw]
May 15 14:03 [raw]
about 2 years ago when this was first posted on BM, some anon made a clever comment about a business model based on creating false camera fingerprints as a service, something involving kate upton and kim kardashian i think? trippy stuff any veterans have a copy?
May 15 14:32 [raw]
I agree with all of that. I think a major problem is people share everything, including all of their pictures, with everyone on the damn planet. You won't find my pictures online anywhere, they are in my posession. So if they are examining my pictures, there won't be any debate they are mine because they only exist on my hardware, and they had to kick down my door to get them (digitally or physically). I also happen to think people that share their pictures online are also to stupid to be walking around. What is this obsession with "sharing" their entire fucking life with the world? Sorry Sally, your life is just not that damn important to anyone else.
May 15 14:51 [raw]
This anon was late.
May 15 17:00 [raw]
I too do not share any personal information online. No online bill pay, no online banking, no facebook, no twitter, no social media, no webmail. I lived the first half of my life with no Internet and I survived. I think I'll survive the rest of my life without sharing it with everybody.
May 15 18:23 [raw]
Now you are online and you are fucked. NSA listens to your provate life, because PC-speaker attached to mainboard is also condenser microphone.
May 15 21:40 [raw]
That's why I have a white noise generator running in the same room I'm in, it helps against the glass mics also. Besides, even if have time to listen to everyone's conversations, read everyone's emails, watch everyone's browsing history, I'm just a small blip in a big map. Huge number of dumbasses browsing kiddie porn, building bombs, and watching videos of the Gaza strip to worry about me here.
May 15 23:22 [raw]
You probably mean a "dynamic microphone" (if you have a regular coil-and-membrane type pissy-squeaker) or a "piezoelectric microphone" (if you have a piezo buzzer like some industrial SBCs). It's NEVER a "condenser microphone".
May 16 01:17 [raw]
He's just showing his age.
May 16 01:42 [raw]
the beeper circuit cannot act as input, just PWM output you stupid fuck
May 16 02:20 [raw]
> just PWM output you stupid fuck It's a well-known fact (with actual real-life applications) that both electromagnetic and piezoelectric speakers *can* be used as microphones *if* a suitable amount of amplification and filtering are applied, you stupid fuck. Of course, none of these elements are present by default in a normal mainboard design, but they can be added quickly and inexpensively as an aftermarket drop-in module, you retarded cunt maggot. One note though, if it gets to dropping modules into other people's computers, instead of repurposing the squeaker, might as well include a proper mic, even a condenser one to make the OP happy. KISS principle FTW :) you cocksucking cum rag. (fuck I love Bitmessage debate, reminds me of primary school... good times!)
May 16 05:42 [raw]
https://en.wikipedia.org/wiki/Microphone#Condenser The condenser microphone, invented at Western Electric in 1916 by E. C. Wente, is also called a capacitor microphone or electrostatic microphone—capacitors were historically called condensers. Here, the diaphragm acts as one plate of a capacitor, and the vibrations produce changes in the distance between the plates.
May 16 05:47 [raw]
> the diaphragm acts as one plate of a capacitor, and the vibrations produce changes in the distance between the plates Exactly, you can never convert an existing speaker into that. There is simply no similar device anywhere in speaker world, let alone inside a PC.
May 16 06:23 [raw]
It is possible. And it was done.
May 16 06:27 [raw]
Convert a PC SPEAKER into a CONDENSER MICROPHONE? Source please, and thank you.
May 16 06:57 [raw]
Convert a PC SPEAKER into a MICROPHONE.
May 16 07:01 [raw]
Convert a PENIS into a MICROPHONE.
May 16 07:02 [raw]
Convert a ANUS into a PC SPEAKER.
May 16 07:19 [raw]
Exactly. Please have another look at the entire thread below, focus on the highlighted lines. (OP) >>>> because PC-speaker attached to mainboard is also condenser microphone >>> It's NEVER a "condenser microphone". >> the diaphragm acts as one plate of a capacitor, and the vibrations produce changes > you can never convert an existing speaker into that Now say it with me: You can convert an electromagnetic speaker into a DYNAMIC microphone (widely done) You can convert a piezoelectric speaker into a PIEZOELECTRIC microphone (done before) You can NEVER convert ANY type of speaker into a CONDENSER microphone Hope it makes sense now. :)
May 16 07:43 [raw]
Thank you, sir. You are a gentleman and a scholar.
May 16 17:45 [raw]
my rig has no speaker or mic.
May 16 17:53 [raw]
'Because of this simple trick NSA hates him'
[chan] Nothing to see Here
May 16 19:28 [raw]
I found a really cool white noise generator for android. Install on a half dozen cheap android devices and place them around the room. Profit!
May 19 01:52 [raw]
1) Connect speaker into microphone port of laptop 2) Start audio recoding 3) Shout loudly into speaker 4) Listen your recording
May 19 05:29 [raw]
I don't own external speaker, so I used my headphones and it worked as microphone. My headphones are listening to me, like in Soviet Russia.
May 19 12:20 [raw]
Smart criminals will not be caught by fingerprinting of images. It has been known for decades that the output of printers are traceable, but that hasn't stopped death threats or prevented smart criminals from evolving. If criminals know that their camera or printer leaves a signature, they wil naturally dispose of it after commiting their crime. The only situations wherein I think that might aid the government is in the case of (1) stupid criminals or (2) criminals using the same camera or equipment for related crimes.
May 19 12:24 [raw]
(3) normal people doing something the goverment doesn't like, but isn't illegal (yet), like thinking for themselves.
May 19 12:37 [raw]
Hardware serial numbers are correlated with noise fingerprints, so the exact copy of camera can be identified from photo. Then, using data from producer, wholesalers or retails, more or less general geographical localisation of buyer can be traced. Then the usual stuff: cameras, tracing cellphones...
May 19 12:58 [raw]
idiot. if u destroy ure cam but ure still on record buying it at amazon , ure fucked. nsa FUD troll asshole !
May 20 03:30 [raw]
> What about child pornographers? Oh, they're actually OK. Consensual child porn is not a criminal offense in Malaysia. Ten bitmessage users just saw this and booked airline tickets. That's why it's so quiet in the chans.
May 20 03:32 [raw]
Is there some kind of medication in your drinking water?
13 hours ago [raw]
Convert a micropenis into a women's joke.
13 hours ago [raw]
Don't your mean, plug a subwoofer up your anus ?
|VMPC and VMPC-R source code||May 21 19:36||1|
|Coded messages||May 21 18:55||4|
|324C5D3C4C991E69B7E643A5ADBEFEAF||May 21 14:58||1|
|Linux ebooks (unsorted)||May 21 11:52||9|
|Share||May 21 11:35||1|
|Little White Panties||May 21 10:13||1|
|break this too||May 21 10:04||2|
|break this||May 21 10:03||2|
|Why We should not Troll or Insult Others||May 21 09:57||2|
|NSA doesn't joke, folks||May 21 09:49||37|
|NSA - the big, mean bogie man||May 21 09:24||4|
|quam me impii nudus conportabis||May 21 09:14||2|
|disperdam similis invitat incenso in abscondito sociis||May 21 09:12||2|
|yyy||May 21 09:00||1|
|CFD823A85B2F83276EBD0A0E35466B27||May 20 19:06||1|
|68ED4104F3436B0060E3E85CD2622892||May 20 16:13||1|
|Vol. 53 No.5, November 1954 Research Paper 2547||May 20 08:47||1|
|How to create a "send only" bitmessage address||May 20 06:34||1|
|62F9B07E32321937744CA454CA0A7881||May 20 00:45||1|
|Join [chan] alt.anonymous.messages !||May 20 00:22||22|
|C1D0B36D1E8F4FDAC64408A76150CC50||May 19 21:52||1|
|/join #bitmessage on eris.us.ircnet.net :6667||May 19 21:45||1|
|B35B71FB7BA16303E33B9A63B27F22C7||May 19 17:16||1|
|💚 Better Than Abortion on Demand: Grilled Fetus on De Man 💚||May 19 16:58||2|
|qqqq||May 19 12:12||4|
|OTR interception||May 19 11:56||29|
|(no subject)||May 19 07:36||6|
|antivirus could be the ultimate cyberespionage spying tool||May 19 07:28||2|
|NATO-Russia: Setting the Record Straight||May 19 07:21||3|
|Dan Carlin's Hardcore History Podcast||May 19 02:45||2|
|https://www.blackhat.com/docs/us-16/materials/us-16-Ermishkin-Viral-Video-Exploiting-Ssrf-In-Video-Converters.pdf||May 19 01:06||4|
|Grand Master||May 19 00:06||1|
|06d7e73f9e8d66df93cce053475d70da0201b0d3f3cee088cdf879bf||May 18 21:36||1|
|FA8D62DC6E3669C4E6EC8FFA487CDC2C||May 18 20:53||1|
|A Brief Introduction to Holocaust Revisionism||May 18 20:13||4|
|DARKNET DIRECTORY ASSISTANCE||May 18 20:04||5|
|anytime||May 18 19:43||3|
|D9114DA87E23C13616FCCA05ECB24F33||May 18 19:28||1|
|3EBD07196301F6C66F24DC57B6217B2C||May 18 14:09||1|
|UK Column News - 17th May 2018||May 18 11:33||5|
|May 18 10:18||2|
|200 years Karl Marx||May 18 10:18||15|
|2018 : Der junge Karl Marx -- youtube.com/watch?v=AbM76KUm4IM -- 2 hours "Le Jeune Karl Marx"||May 18 10:18||2|
|EFAIL?! OTR safe ?||May 17 14:30||4|
|EFAIL?!||May 17 13:54||6|
|bitmessage tor hidden service||May 17 11:10||3|
|Re: NSA doesn't joke, folks||May 17 10:24||7|
|Poland finds other body parts in coffin of president killed in 2010 crash||May 17 08:20||4|
|New Evidence Shows Russia Played a Role in Plane Crash That Killed Poland’s Top Brass||May 17 08:12||2|
|36B3BE21C26DB681F5449ECB764715FD||May 17 07:31||1|
|May 17 07:00||1|
|Good evening, fellow Pascalians, looking for help.||May 16 21:12||4|
|[chan] gaslighter <BM-2cWGB2RsRNwLVm8CRoskUKdMgiD1eEy4o8>||May 16 20:58||1|
|Curious||May 16 19:33||2|
|D7DE8B416982CE92936A439AC3A6CAE1||May 16 19:28||7|
|unspecified vulnerability in GPG||May 16 13:36||1|
|To NSA fuckers running quzwelsuziwqgpt2.onion:8444||May 16 08:16||3|
|Introducing DreamLab||May 16 08:06||2|
|Python ebooks (just copy pasting from elsewhere)||May 16 08:00||1|
|UK Column News - 15th May 2018||May 16 07:50||2|
|unspecified vulnerability in GPG||May 16 00:29||7|
|This shit world||May 16 00:17||15|
|nothing wrong with suicide these days||May 16 00:17||14|
|Pascal on the rise||May 15 18:23||4|
|Help solve this problem||May 15 18:16||7|
|The ruler||May 15 18:02||2|
|Star Wars||May 15 17:46||4|
|The FORCE behind ALL ad spam||May 15 16:46||2|
|I'm sorry||May 15 11:37||9|
|Fortnite||May 15 11:31||3|
|An Official Statement on New Claimed Vulnerabilities||May 15 11:31||1|
|ascii goatse||May 15 09:33||1|
|I finally found time to take a closer look at the encryption algorithm||May 15 08:40||3|
|Latest chans?||May 14 23:26||4|
|A small number of exits gives you a better anonymity set||May 14 23:26||2|
|How to Make TNT||May 14 23:26||8|
|7B18C5AC8AB8D962FA291C94CCB0050A||May 14 18:48||1|
|Tor Browser is not fully compatible with Windows 10||May 14 16:38||1|
|SPOUSE PHONE||May 14 14:58||2|
|N.S.A. May Have Hit Internet Companies||May 14 14:13||1|
|In need of muliplatform commandline file encryption tool||May 14 11:10||64|
|Answer this question.||May 14 10:51||6|
|Good jokes||May 14 10:22||7|
|Truth about Islam||May 14 08:28||1|
|hmm..||May 14 08:04||5|
|B226F79602253B5037FD5874C46D156C||May 14 07:36||1|
|COOL||May 14 06:55||5|
|phagg maison||May 14 06:55||2|
|UK Column News - 9th May 2018||May 14 05:40||3|
|AEDC0EA4906518F90FACCB1697108202||May 13 16:56||1|
|C9C0239619655A566540017148A4DCB1||May 13 12:17||1|
|VDCM||May 13 07:32||1|
|Mr. Know-it-all Smarty Pants||May 13 07:26||2|
|4||May 13 06:36||1|
|2||May 13 06:35||1|
|3||May 13 06:35||1|
|1||May 13 06:31||1|
|Alternative Bitmessage Chans||May 13 06:06||1|
|D3AA5A04499B17C98A200A7A731CA002||May 12 19:45||1|