Skip to content

I'm trying to find a way to connect to C2PA to send my proposal #93

@zlev67

Description

@zlev67

TrustInformation.pdf

Observing the proliferation of manipulated media in social media—particularly during critical events like the Gaza conflict where fabricated images and videos caused significant reputational damage and influenced global opinion—I began thinking about fundamental solutions to the authenticity problem. Current approaches, including software-based content credentials, face inherent limitations: they can be circumvented, applied post-creation, and don't prevent re-capture attacks where manipulated content is displayed on screens and re-photographed with legitimate devices.
The attached proposal outlines a comprehensive hardware-based Public Key Infrastructure (PKI) system that embeds cryptographic signing capabilities directly into camera hardware with the following key features:

Tamper-resistant private keys stored in secure enclaves, inaccessible to software
Trusted boot processes preventing key extraction or firmware modification
Mandatory GPS and timestamp metadata with hardware-validated trusted paths
Anti-circumvention mechanisms detecting screen re-capture attempts
Certificate Authority hierarchy with device and manufacturer accountability
Legal framework requiring verified content in mass media and official proceedings

This infrastructure creates verification at the point of capture rather than post-creation, making it cryptographically impossible to produce signed content of manipulated media without physically compromising hardware devices.
I believe this approach could complement C2PA's existing work by addressing the hardware layer—ensuring that content credentials originate from trusted capture devices rather than being applied by potentially compromised software systems. The proposal includes technical specifications, anti-spoofing measures, legal frameworks, and implementation roadmaps.
I would greatly appreciate your feedback on this proposal and any guidance on how such infrastructure-level standards might be developed within or alongside C2PA's efforts. If there are appropriate forums, working groups, or standards bodies where this proposal should be presented, I would be grateful for your direction.
Thank you for your time and for your leadership in advancing content authenticity standards.
Best regards,
Lev Zlotin
lev.zlotin@gmail.com

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions