• Tja@programming.dev
    link
    fedilink
    arrow-up
    5
    ·
    6 months ago

    The hash would (hopefully) be authenticated. If you want to google it, search for “HMAC”.

    This is assuming that the local key doesn’t get leaked, which is assuming a lot.

    • NotMyOldRedditName@lemmy.world
      link
      fedilink
      arrow-up
      2
      ·
      6 months ago

      Aren’t these hardware keys unusable outside the hardware?

      You’d need to somehow have the AI authenticate the image through the cameras hardware to use it.

      Still possible though.

      • andrew@lemmy.stuart.fun
        link
        fedilink
        English
        arrow-up
        3
        ·
        6 months ago

        It’ll probably be stored in something like a TPM, whose primary purpose is to make intact extraction of the keys difficult or impossible. A few keys might become compromised but in this scenario (unlike DRM decryption) it’s easy to ignore those keys. There’s always the chance an exploit becomes available and is more widely used, though, in which case it would definitely be less valuable.