- cross-posted to:
- technology
webghost0101 ( @webghost0101@sopuli.xyz ) 17•11 months agoAll good and well till someone takes a screenshot.
𝒍𝒆𝒎𝒂𝒏𝒏 ( @lemann@lemmy.one ) 6•11 months agoIt might be resistant to screenshots - unless I missed it, the article didn’t clarify whether the obfuscation process is applied to the image on a per-pixel basis, or within the file format itself…
If it was that easy to bypass it would be a pretty futile mechanism IMO, one would just need to convert the image to strip out the obfuscation 🫠 or just take a screenshot as you said
whataboutshutup ( @whataboutshutup@discuss.online ) 3•11 months agoOnce again there comes the time to manually shop oneself to handshake with celebrities.
andruid ( @andruid@lemmy.ml ) 1•11 months agoThe white paper linked’s title is very pragmatic sounding “Raising the Cost of Malicious AI-Powered Image Edit”. Would like to read it deeper later to see what the actual mechanisms deployed are. I know ive considered some form of attestation embedding both in the data and form linked with cryptographic signature. You know for emportant things like politics, diplomacy and celeberty endorsement. /s