TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Attested Audio with ZKP

23 pointsby rpruizalmost 2 years ago

4 comments

Adroxalmost 2 years ago
I don&#x27;t understand how this avoids any simple attack both for audio or video:<p>- Alter&#x2F;manipulate the audio&#x2F;video has much as you want.<p>- Play it.<p>- Have a &quot;attested&quot; microphone&#x2F;video recording the &quot;manipulated audio&#x2F;video&quot;.<p>For video maybe you can actually try to prove that&#x27;s recording a screen not the real event, but seems much harder for audio, you can just say the echos&#x2F; distortions came from the environment...
评论 #36436317 未加载
评论 #36436097 未加载
noodlesUKalmost 2 years ago
I would say there is a better way of doing this. In the forensic community it has been long known that audio can be timestamped and fingerprinted by the 50&#x2F;60hz electrical hum in the background. In many countries this hum is recorded so it can be used later as evidence.<p>Unless counter-forensics are applied, AI audio is not going to have the right hum.<p>It’s not cryptographically secure, but it gives good assurance and doesn’t require tamper resistant hardware (which makes the cryptographic security dependent on how secure the resident keys are)<p><a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Electrical_network_frequency_analysis" rel="nofollow noreferrer">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Electrical_network_frequency...</a>
评论 #36434484 未加载
lionkoralmost 2 years ago
&gt; The hardware manufacturer can destroy the private key after it is placed on the device. By doing so, the private key is inaccessible!<p>I&#x27;m pretty sure the private key is very accessible, if it&#x27;s used at runtime which it is. Just not easily.
评论 #36435126 未加载
评论 #36439428 未加载
ssfrralmost 2 years ago
&gt; In our setting, we can compute a function that computes the hashes of the inputs and outputs the edited audio from the inputs. By revealing the hashes, we can be assured that the inputs match the recorded audio!<p>I don&#x27;t understand how this works, or what exactly is being proven here. For instance, you could silence the given inputs and inject some other unrelated audio, so the fact that your output hash incorporates the input hashes doesn&#x27;t seem very meaningful.<p>I figure I must be missing something here.
评论 #36461106 未加载