• SchmidtGenetics@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      3
      ·
      2 months ago

      To prove the legibility of the image? It’s a great data point that’s pretty anonymous, they don’t need to include the Mac, sim, serial or other information.

      • conciselyverbose@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        2 months ago

        A. It’s not even the weakest of weak evidence of whether a photo is legitimate. It tells you literally zero.

        B. Even if it was concrete proof, that would still be a truly disgusting reason to think you were entitled to that information.

        • SchmidtGenetics@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          edit-2
          2 months ago

          You can use metadata to prove an image is real, you can’t prove something is real without it, so it’s the only current option. It tells you a lot, you just don’t want people to know it apparently, but that doesn’t change it can be used to legitimatize an image.

          What’s disgusting about knowing if an image was taken on a Sony dslr, and Android or an iPhone? And entitled…? This is so you can prove your image is real? The hell you talking about here?

          • conciselyverbose@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            2 months ago

            No, you cannot use metadata as even extremely weak evidence that an image is real. It is less than trivial to fake, and the second anyone even hints at making it a standard approach, it will be on every photo anyone uses to mislead anyone.

            Most photos on the internet are camera phones, and you absolutely are not entitled to know what phone someone has. Knowing someone’s phone has infinitely more value to fingerprinting a user than including metadata could ever theoretically have to demonstrate whether a photo is legitimate or not.

            Photos without a specific, on record provenance from a credible source are no longer useful for evidence of anything. You cannot go back from that.

            • SchmidtGenetics@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              2
              ·
              edit-2
              2 months ago

              Meta data creates a string, if you want to claim ownership of an image and I show an image with earlier metadata, who’s is the real one? Yes it can be faked, but it can also be traced. Thats not a reason to not do something, the hell? That’s like suggesting you can’t police murders because someone can fake a murder.

              What is identifiable about the type of phone you have…? Anyone that sees you in public has that information lmfao, there’s far more “fingerprintable” data in the exif than the device that anyone can visually see you have…… that’s the strangest privacy angle I’ve seen and you’re talking like it’s this big huge issue? I’ve asked you to explain and you haven’t, why is this?

              And without that exif data you can’t prove any of that… you realize this… yeah…?

              What is your point here? That you’re concerned that you might have someone knowing your phone? You realize you can scrub that information yourself if you’re not worried about proving authenticity…? Yeah…?

              • conciselyverbose@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                2 months ago

                You very clearly have no idea whatsoever what you’re talking about. This is all complete nonsense.

                Anyone can write exif data to say anything they want it to. You “showing an image with earlier metadata” is completely arbitrary and doesn’t tell anyone literally anything about which one is more likely to be “real”. Again, it’s not “weak” or “bad” evidence. It is literally not capable of being evidence.

                • SchmidtGenetics@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  3
                  ·
                  edit-2
                  2 months ago

                  So you gonna address what’s identifiable about a phone… or are you just gonna ignore this and scream about the one thing we know can prove authenticity of an image? I’ve addressed the can be faked… you gonna address any of my points…?

                  I said I had a little knowledge, do you have a point here or you just gonna scream that exif data can be faked? I was trying to have a civil conversation about this.

                  If there’s an image with two different exifs data, this will flag it, problem solved, what’s your issue…? Isn’t that the point? Flag fake images…?

                  • conciselyverbose@sh.itjust.works
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    arrow-down
                    1
                    ·
                    2 months ago

                    What device you use is one of the biggest data points advertisers and trackers use to fingerprint you across the internet. No, “I use a Google Pixel 9” does not, by itself, de-anonymize you, but it does make a big dent when combined with other information.

                    You keep talking about “proving the authenticity of an image” with something that does not even move you .00000001% towards an image being legitimate. It is literally zero information about that question in every possible context. It is, eventually, if you throw out every camera on the planet and use heavy cryptography, theoretically possible to eventually, in the future, provide some evidence that some future picture came from some specific camera, but it will still not be proof that what that camera processed wasn’t manipulated.