10 comments

  • FuriouslyAdrift an hour ago ago

    Chaos Computer Club talk on this (using glitter nail polish) from way back in 2014...

    https://www.youtube.com/watch?v=zpFKeVuP0_w

    The talk covers A LOT more and focusing on "evil maid" attacks.

  • gus_massa 2 days ago ago

    Old discussion https://news.ycombinator.com/item?id=31897530 (642 points | June 2022 | 165 comments)

  • ape4 27 minutes ago ago

    The article anonymized a face using the compromised swirl method

    • Katzenmann 24 minutes ago ago

      Yeah but it looks like the face was also blurred before the swirl

  • zahlman an hour ago ago

    > If of one or more elements within the mosaic are modified, unauthorized access or compromise can be assumed.

    ... But how is the recipient certain of what the mosaic should be? You can't put the reference photo in the same package, because it's taken after sealing. And if you send it separately, that package is also subject to tampering.

    • jrm4 5 minutes ago ago

      um, you like text it or email it?

  • leakycap 2 days ago ago

    I would have never come across this except on HN & it's awesome!

    • extraduder_ire 3 hours ago ago

      I first learned about it via the blink comparison app on f-droid, linked in the article.

  • metalman 4 hours ago ago

    there is I believ a similar thing useing paint spatters as idicators of authentisity of electronics and also as proof of tampering, as the patterns are unique and can be produced, recorded ,quickly and cheeply.