• OhNoMoreLemmy@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    edit-2
    3 days ago

    You can look up what Adobe are doing in this space.

    Long-term it’s going to be something like every secure device comes with its own inbuilt unit for cryptographically signing the raw files. These signatures can then be matched against manufacturers databases of approved signatures.

    This doesn’t guarantee that nothing has been tampered with, but it does provide a link back to the original device allowing you to inspect it.

    There are huge privacy concerns as well, anything that’s used to indicate authenticity can be used to track.