> If of one or more elements within the mosaic are modified, unauthorized access or compromise can be assumed.
... But how is the recipient certain of what the mosaic should be? You can't put the reference photo in the same package, because it's taken after sealing. And if you send it separately, that package is also subject to tampering.
there is I believ a similar thing useing paint spatters as idicators of authentisity of electronics and also as proof of tampering, as the patterns are unique and can be produced, recorded ,quickly and cheeply.
Chaos Computer Club talk on this (using glitter nail polish) from way back in 2014...
https://www.youtube.com/watch?v=zpFKeVuP0_w
The talk covers A LOT more and focusing on "evil maid" attacks.
Old discussion https://news.ycombinator.com/item?id=31897530 (642 points | June 2022 | 165 comments)
The article anonymized a face using the compromised swirl method
Yeah but it looks like the face was also blurred before the swirl
> If of one or more elements within the mosaic are modified, unauthorized access or compromise can be assumed.
... But how is the recipient certain of what the mosaic should be? You can't put the reference photo in the same package, because it's taken after sealing. And if you send it separately, that package is also subject to tampering.
um, you like text it or email it?
I would have never come across this except on HN & it's awesome!
I first learned about it via the blink comparison app on f-droid, linked in the article.
there is I believ a similar thing useing paint spatters as idicators of authentisity of electronics and also as proof of tampering, as the patterns are unique and can be produced, recorded ,quickly and cheeply.
Much like the split tally stick: https://en.wikipedia.org/wiki/Tally_stick