TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Attested Audio with ZKP

23 点作者 rpruiz将近 2 年前

4 条评论

Adrox将近 2 年前
I don&#x27;t understand how this avoids any simple attack both for audio or video:<p>- Alter&#x2F;manipulate the audio&#x2F;video has much as you want.<p>- Play it.<p>- Have a &quot;attested&quot; microphone&#x2F;video recording the &quot;manipulated audio&#x2F;video&quot;.<p>For video maybe you can actually try to prove that&#x27;s recording a screen not the real event, but seems much harder for audio, you can just say the echos&#x2F; distortions came from the environment...
评论 #36436317 未加载
评论 #36436097 未加载
noodlesUK将近 2 年前
I would say there is a better way of doing this. In the forensic community it has been long known that audio can be timestamped and fingerprinted by the 50&#x2F;60hz electrical hum in the background. In many countries this hum is recorded so it can be used later as evidence.<p>Unless counter-forensics are applied, AI audio is not going to have the right hum.<p>It’s not cryptographically secure, but it gives good assurance and doesn’t require tamper resistant hardware (which makes the cryptographic security dependent on how secure the resident keys are)<p><a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Electrical_network_frequency_analysis" rel="nofollow noreferrer">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Electrical_network_frequency...</a>
评论 #36434484 未加载
lionkor将近 2 年前
&gt; The hardware manufacturer can destroy the private key after it is placed on the device. By doing so, the private key is inaccessible!<p>I&#x27;m pretty sure the private key is very accessible, if it&#x27;s used at runtime which it is. Just not easily.
评论 #36435126 未加载
评论 #36439428 未加载
ssfrr将近 2 年前
&gt; In our setting, we can compute a function that computes the hashes of the inputs and outputs the edited audio from the inputs. By revealing the hashes, we can be assured that the inputs match the recorded audio!<p>I don&#x27;t understand how this works, or what exactly is being proven here. For instance, you could silence the given inputs and inject some other unrelated audio, so the fact that your output hash incorporates the input hashes doesn&#x27;t seem very meaningful.<p>I figure I must be missing something here.
评论 #36461106 未加载