They warned you: Someone allegedly used a politician’s cloned voice to interfere with an election | It will most assuredly not be the last time this happens::undefined

  • Pxtl@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    10 months ago

    I keep saying: none of this will end until we get a clean, cryptographically secure, government-backed way to ID who is sending us something, and it becomes an expectation to use it all the time for anything important. Which is why I have conspiracy theories about the conspiracy theories about government ID.

    • RobotToaster@mander.xyz
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      10 months ago

      a clean, cryptographically secure, government=backed way to ID who is sending us something, and it becomes an expectation to use it all the time

      sounds dystopian.

    • kibiz0r@midwest.social
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      10 months ago

      You don’t even need to ID who is sending it, just that the content itself can provide some grounding in an authentic source.

      Like if a picture can say that it derives from an original photo captured by a camera signed with Canon’s credentials, and was changed in Photoshop in these specific ways and signed by Adobe…

      There is a group working on exactly this. It’s called C2PA.