this post was submitted on 20 May 2024
706 points (99.3% liked)

cute dogs, cats, and other animals

10894 readers
1 users here now

founded 4 years ago
 
you are viewing a single comment's thread
view the rest of the comments
[–] Tja@programming.dev 5 points 5 months ago (1 children)

The hash would (hopefully) be authenticated. If you want to google it, search for "HMAC".

This is assuming that the local key doesn't get leaked, which is assuming a lot.

[–] NotMyOldRedditName@lemmy.world 2 points 5 months ago (1 children)

Aren't these hardware keys unusable outside the hardware?

You'd need to somehow have the AI authenticate the image through the cameras hardware to use it.

Still possible though.

[–] andrew@lemmy.stuart.fun 3 points 5 months ago

It'll probably be stored in something like a TPM, whose primary purpose is to make intact extraction of the keys difficult or impossible. A few keys might become compromised but in this scenario (unlike DRM decryption) it's easy to ignore those keys. There's always the chance an exploit becomes available and is more widely used, though, in which case it would definitely be less valuable.