· Föderation EN Di 30.01.2024 17:54:19 @dpwiz Badly designed cryptosystems can be broken in a number of ways, but well designed ones, particularly ones with a transparent implementation and selection process, are orders of magnitude more secure. Breaking SHA-2 for instance - which the C2PA protocol uses currently - would not simply require state-level computational resources, but a genuine mathematical breakthrough in cryptography. Perhaps ironically, reaching the conclusion "all cryptosystems can be easily broken" from historical examples of weak cryptosystems falling to attacks, is another example of eliminating false positives (trusting a cryptosystem that is weak) at the expense of increasing false negatives (distrusting a cryptosystem that is strong). |
Föderation EN Di 30.01.2024 22:05:56 @tao It’s in their published threat model / security assumptions:
And later, in the spoofing section. Proper key handling is notoriously difficult. And with incentives like here, attackers would be motivated to hit it even more than some DRM system. And anyway, no need for a breakthrough if you can walk in with a gag order and do what you need. |