W Aaron Waychoff, creator of the Falsom Upside-Down ⊥ "Resist" campaign, was inspired by this 2016 post; he writes, "I've made a proof-of-concept encrypting digital camera based on the open source, widely adoped GnuPG. This project uses public key encryption to encrypt every photo the camera takes before writing the encrypted version to memory. Of particular note, there are absolutely no UI changes over what an ordinary point-and-shoot camera provides. No extra keyboards or touch screens are needed as no passwords need be entered."
In a nutshell, the camera works like this:
* Generate a keypair using GnuPG on any computer
* Export the public key to removable media (SD card, USB stick, etc)
* Insert the media in the camera and all photos will automatically be encrypted using the included key until the media is removed
* Decrypt at your leisure using the secure private key
Note that with this setup, a journalist (or other user) need not even have access to the private key while in the field - or at all should a trusted other party be given the task of generating the keypairs.
The main goal of this project was to show that encryption could be made available on many current cameras with only a software update. There are caveats to be sure, but should the user choose to live with the tradeoffs (speed, lack of image review) then they should have these important features available. And they could! I would especially love to see CHDK (The open source Canon firmware alternative) support something like this.
Automatic Encrypting Camera Proof-of-Concept [W Aaron Waychoff/waaronw.com]
We shouldn’t have to wait for camera encryption [W Aaron Waychoff/waaronw.com]
The epidemic of cryptojacking malware isn't merely an outgrowth of the incentive created by the cryptocurrency bubble -- that's just the motive, and the all-important the means and opportunity were provided by the same leaked NSA superweapon that powered last year's Wannacry ransomware epidemic.
"Idea-instructions" bills itself as "An ongoing series of nonverbal algorithm assembly instructions", with a half-dozen illustrations of popular computer science concepts covered to date; the latest covers Public-Key Crypto, one of the most important and elusive concepts from modern crypto.
The U.S. Securities and Exchange Commission today pledged to aggressively scrutinize publicly-traded companies that suddenly change their name or their business model to try to profit from the nutty hype surrounding cryptocurrency. SEC Chairman Jay Clayton threw this wet towel on the blockchain bubble Monday.
The web is vast, and while there’s room for everyone, competition is stiff when it comes to landing on that first page of a Google search. That’s why developers aren’t afraid to spend exorbitant amounts of time and money on search engine optimization (SEO) to ensure their sites rank higher than others. However, not all […]
Many of us enjoy the aesthetic of vintage electronics, but trying to use most hardware from the 1950’s isn’t necessarily practical. This is especially true where speakers are concerned. While most of us can appreciate the old-school feel of retro speakers, they have a hard time matching the convenience and power delivered by today’s Bluetooth speakers. […]
Python is one of the most popular and versatile programming languages used by developers today, making it an ideal first choice for those looking to kickstart a career in programming. While you could go back to school or sign up for a pricey coding bootcamp, you can learn the essentials of coding with Python at […]