this post was submitted on 02 Jun 2025
2181 points (99.4% liked)

memes

15779 readers
3984 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to [email protected]

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] Saledovil 1 points 3 weeks ago (1 children)

No, it is not security through obscurity. It’s a message signature algorithm, which are used in cryptography all the time.

Yes it is. The scheme is that when you take a picture, the camera signs said picture. The key is stored somewhere in the camera. Hence the secrecy of the key hinges on the the attacker not knowing how the camera accesses the key. Once the attacker knows that, they can get the key from the camera. Therefore, security hinges on the secrecy of the camera design/protocol used by the camera to access the key, in addition to the secrecy of the key. Therefore, it is security by obscurity.

[–] [email protected] 0 points 1 week ago (1 children)

And how do they get the camera? You could make the same exact claims about SSH being useless because "if an attacker gets the key, it's over!"

NO SHIT!!

[–] Saledovil 0 points 1 week ago

They buy it at a store.