Timwi 21 hours ago

It's a cool idea but it kind of bothers me that with all this effort, you still only get a boolean worth of information (it was either accessed or not). No clue about who, when, where or why.

leakycap 4 days ago

I would have never come across this except on HN & it's awesome!

  • extraduder_ire 2 days ago

    I first learned about it via the blink comparison app on f-droid, linked in the article.

metalman 2 days ago

there is I believ a similar thing useing paint spatters as idicators of authentisity of electronics and also as proof of tampering, as the patterns are unique and can be produced, recorded ,quickly and cheeply.

zahlman 2 days ago

> If of one or more elements within the mosaic are modified, unauthorized access or compromise can be assumed.

... But how is the recipient certain of what the mosaic should be? You can't put the reference photo in the same package, because it's taken after sealing. And if you send it separately, that package is also subject to tampering.

  • ZeWaka 2 days ago

    > ...an original photo, which has been taken for example, by a manufacturer, signed and transmitted to a customer via an encrypted communication channel, with a photo of the current state.

    • zahlman 2 days ago

      Thanks, glossed over that, and also should have thought of it.

  • jrm4 2 days ago

    um, you like text it or email it?

ape4 2 days ago

The article anonymized a face using the compromised swirl method

  • Katzenmann 2 days ago

    Yeah but it looks like the face was also blurred before the swirl

vpribish 2 days ago

"The rice is a little more fine-grained"

nice writeup!