LWN: Comments on "ProofMode: a camera app for verifiable photography" https://lwn.net/Articles/726142/ This is a special feed containing comments posted to the individual LWN article titled "ProofMode: a camera app for verifiable photography". en-us Sun, 19 Oct 2025 23:54:56 +0000 Sun, 19 Oct 2025 23:54:56 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net ProofMode: a camera app for verifiable photography https://lwn.net/Articles/726827/ https://lwn.net/Articles/726827/ branden <div class="FormattedComment"> "CameraV takes a number of steps to ensure that images are not altered while on the user's device, lest the app then be used to create phony attestations and undermine trust in the system. First, the MD5 hash"<br> <p> <font class="QuotedText">&gt;cringe&lt;</font><br> </div> Thu, 29 Jun 2017 21:37:25 +0000 ProofMode: a camera app for verifiable photography https://lwn.net/Articles/726428/ https://lwn.net/Articles/726428/ pboddie <div class="FormattedComment"> It depends if the thing you're documenting only exists at a certain location or not. If some bad thing or other occurs in multiple locations, identifying a single location might help identify those known to be present at that location and give clues about the identity of the photographer or people that assisted the photographer.<br> <p> Also the picture might be documentation of an object rather than an event. Let us suppose that you meet someone who shows you evidence of some bad thing or other that you cannot just take away with you and show to everyone. You might want to withhold geolocation data in order to prevent identifying your helpers who might already be tracked and therefore be easily associated with the published picture later on.<br> <p> But I think that withholding geolocation data is optional, if I understood the article properly.<br> </div> Mon, 26 Jun 2017 12:32:15 +0000 ProofMode: a camera app for verifiable photography https://lwn.net/Articles/726420/ https://lwn.net/Articles/726420/ hifi <div class="FormattedComment"> I think it works only to prove that you are the author of an image by providing the hash as early as you can. A neutral third party site that you can upload a hash of the raw/source image can be proof of ownership. Whoever uploaded the hash first owns the picture. The site doesn't need to store anything else than the hash, uploader and the upload time for verification purposes. Whatever the image metadata itself says about the time and place isn't verifiable.<br> <p> This could help fight against *other* people doctoring your image and claiming it to be the original as you can always prove that the original image file you have had been hashed before the fake image proving you have the original.<br> <p> I don't see any way to unanimously prove when/where a picture was taken, only the earliest time when it was publicly known to exist and who claimed to own it at that time.<br> </div> Mon, 26 Jun 2017 07:59:05 +0000 ProofMode: a camera app for verifiable photography https://lwn.net/Articles/726418/ https://lwn.net/Articles/726418/ eru <div class="FormattedComment"> A bit odd to worry about erasing geolocation data, if the goal is to improve the credibility of the shot. I mean, if the picture is supposed to document human rights abuses in Cruelia, its metadata should show it was taken there.<br> <p> </div> Mon, 26 Jun 2017 06:33:19 +0000 ProofMode: a camera app for verifiable photography https://lwn.net/Articles/726416/ https://lwn.net/Articles/726416/ felixfix <div class="FormattedComment"> My first thought was, how can the proof app tell that its source picture came from the camera app and not from several hours of fakery? If it has some way of telling what app the picture came from, and how quickly, what prevents somebody from faking that app with the fakery app and presenting it to the proof app as just having been taken?<br> <p> One clue is the time stamp and location. If it's an incident where time or location matters, then any delay or going offsite for quiet manipulation will show up as a discrepancy.<br> <p> Can the proof app's actions be duplicated by a fakery program? That would make delayed offsite manipulation feasible. <br> <p> But if the proof app immediately broadcasts a hash of the raw picture, then transmission of the full proofed picture can wait, and manipulation may be impossible.<br> </div> Mon, 26 Jun 2017 05:48:52 +0000 ProofMode: a camera app for verifiable photography https://lwn.net/Articles/726415/ https://lwn.net/Articles/726415/ mjthayer <div class="FormattedComment"> To my mind the main proof that a picture is not faked would be sharing the hash of the image too close to the time of the event in question for there to have been time to fake it. (As long as we have not reached the point where "Siri, fake that picture" is feasible. Who knows then that will be.) I don't see much value in the location data and so on either. It seems to me that if the algorithm is known and there is time to fake anything at all then there will be time to fake the meta data.<br> </div> Mon, 26 Jun 2017 05:34:18 +0000 ProofMode: a camera app for verifiable photography https://lwn.net/Articles/726409/ https://lwn.net/Articles/726409/ droundy <div class="FormattedComment"> I don't understand how they can even theoretically prevent someone from copying the generated keys and fabricating a "proof." Can anyone explain this? Or is the theory just that no one will bother?<br> </div> Sun, 25 Jun 2017 23:39:09 +0000