Back home

Nostr Archives

Network Explorer

OverviewExploreTrending
APIGitHub
mfostr13h ago
The key idea is understanding when and how to attach data in a provenance chain. A Sony camera produces a hardware‑rooted C2PA signature at capture time, signing the EXIF and proprietary metadata inside a secure element. This proves the image was taken on a real Sony device and not generated by AI.Additional manifests such as location, organizational identity, workflow metadata, or edit history can be added later as separate signed assertions. Each added layer must be intentional, privacy‑aware, and auditable, because it expands the legal and trust surface. The result is not a blockchain, but a hardware anchored, append only provenance chain that carries legal weight similar to other cryptographically signed declarations, such as NIP‑62’s “Request to Vanish,” though the mechanisms and goals are different. https://nips.nostr.com/62
❤️ 0 reactions💬 1 replies🔁 0 reposts⚡ 0 zaps

Thread context

Root: b1fd7b36ee4b…

Replying to: ba241b24e014…

Replies (1)

mfostr12h ago
https://c2pa-check.pages.dev/
0000 sats