Content Credentials Show Promise, But Ecosystem Still Young

It's a good start, but an end-to-end workflow requires more: Cameras or smartphones to generate signed images, support for Content Credentials in a wide variety of image-editing software, and the ability to view authenticated metadata on social media and websites. The Cloudflare changes allow its Images service to add actions to the Content Credential manifest and re-authenticate using the company's credentials, Will Allen, head of privacy and media products at Cloudflare, wrote in a blog post describing the feature. Still, some islands of functionality have appeared: Images from OpenAI's DALL-e and Adobe's Firefly are labeled with Content Credentials tagging them as AI-generated, while end-to-end services, such as Truepic, use the technology in its platform to digitally sign and authenticate images. The effort to establish digitally verifiable images, video, and other content using signed metadata known as Content Credentials promises an internet where users can easily determine the source of media and whether it is authentic. As a founder of the content-authenticity movement, Adobe has extensive support for Content Credentials in its own products — such as a beta feature in Photoshop and tagging images generated with its generative AI service, Adobe Firefly. Truepic, for example, essentially created its own end-to-end authenticated image service based on Content Credentials, allowing companies to know the provenance of images. At this year's Consumer Electronics Show in January, Samsung announced its upcoming Galaxy S25 mobile phone will support Content Credentials, but only to label images that have been edited by AI. In the last year, major camera makers — Canon, FujiFilm, Leica, Nikon, and Sony — announced support for the Content Credentials standard, but only a few models with the capability have hit the market. The brainchild of the Coalition for Content Provenance and Authenticity (C2PA), Content Credentials allow the signing of a metadata audit trail — a manifest — that accompanies images and other media. "It is crucial to ensure that Content Credentials are enabled on all devices throughout the entire workflow—from capture to editing to sharing," says Nico Köhler, head of product experiences for Leica Camera AG. While different manufacturers are releasing specific implementations of Content Credentials, creating an end-to-end workflow for images — from creation to editing to distribution to end users — continues to be a challenge. In early February, for example, Cloudflare tackled one small part of a typical workflow, the content delivery network, announcing that its CDN service would preserve image credentials, even through automated compression and image resizing. "This requires that all tools and platforms involved in the process support Content Credentials. Closed end-to-end ecosystems that incorporate the Content Credentials specification show the potential of the digital authentication feature. Content Credentials show each of those steps as part of an audit log, which provides people with information about whether the content they are viewing is real or has been somehow modified. Meanwhile, computer-based editing software that supports Content Credentials is mainly limited to Adobe's products. Because smartphones do not yet have the Content Credential technology embedded in the device, Truepic requires its app be used to take photos and video.

This Cyber News was published on www.darkreading.com. Publication date: Thu, 20 Feb 2025 05:55:13 +0000


Cyber News related to Content Credentials Show Promise, But Ecosystem Still Young

Thousands of Young People Told Us Why the Kids Online Safety Act Will Be Harmful to Minors - How young people feel about the Kids Online Safety Act matters. These comments show that thoughtful young people are deeply concerned about the proposed law's fallout, and that many who would be affected think it will harm them, not help them. In ...
11 months ago Eff.org
Content Credentials Show Promise, But Ecosystem Still Young - It's a good start, but an end-to-end workflow requires more: Cameras or smartphones to generate signed images, support for Content Credentials in a wide variety of image-editing software, and the ability to view authenticated metadata on social ...
1 day ago Darkreading.com
Creating a Smart Home Ecosystem: Seamless Connectivity - Like a finely tuned symphony, creating a smart home ecosystem has the potential to bring harmony and convenience to everyday life. Establishing an interconnected network of digital devices to enable user-controlled automation of various household ...
1 year ago Securityzap.com
States Attack Young People's Constitutional Right to Use Social Media: 2023 Year in Review - Legislatures in more than half of the country targeted young people's use of social media this year, with many of the proposals blocking adults' ability to access the same sites. Courts blocked several of these laws for violating the First ...
1 year ago Eff.org
Credentials are Still King: Leaked Credentials, Data Breaches and Dark Web Markets - Infostealers infect computers, steal all of the credentials saved in the browser along with active session cookies and other data, then export it back to command and control infrastructure before, in some cases, self-terminating. This article will ...
1 year ago Bleepingcomputer.com
Kids Online Safety Shouldn't Require Massive Online Censorship and Surveillance: 2023 Year in Review - Many of these bills would run roughshod over the rights of young people and adults in the process. There's also good news: so far, none of these dangerous bills have been passed at the federal level, or signed into law. That's thanks to a large ...
1 year ago Eff.org
It's Time For Lawmakers to Listen to Courts: Your Law Regulating Online Speech Will Harm Internet Users' Free Speech Rights - Despite a long history of courts ruling that government efforts to regulate speech online harm all internet users and interfere with their First Amendment rights, state and federal lawmakers continue to pass laws that do just that. Three separate ...
7 months ago Eff.org
Don't Fall for the Latest Changes to the Dangerous Kids Online Safety Act - The authors of the dangerous Kids Online Safety Act unveiled an amended version this week, but it's still an unconstitutional censorship bill that continues to empower state officials to target services and online content they do not like. TAKE ...
1 year ago Eff.org
The Endless Pursuit of the Ecosystem - The result was the biggest update I've made to Strategy of Security's cybersecurity ecosystem mapping since I first published it over two years ago. My goal is to define the most comprehensive and accurate taxonomy for the business of cybersecurity ...
1 year ago Securityboulevard.com
Adaptive DDoS Defense's Value in the Security Ecosystem - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
8 months ago Securityboulevard.com
Encrypted mail service still okay with giving PII to cops The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
9 months ago Go.theregister.com
SpiderOak's datacenter upgrade is still borking backups The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
8 months ago Go.theregister.com
LabHost Employs Phishing-as-a-Service Steal Banking Credentials - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Cybersecuritynews.com
Turla APT'c New Tool Designed to Steal Login Credentials - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Gbhackers.com
How to Bind Anonymous Credentials to Humans - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
10 months ago Securityboulevard.com
Notorious Nusa Cloud Exposing TXT Files With User Credentials For Free!! - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
9 months ago Cybersecuritynews.com
Hackers Exploiting Docusign With Phishing Attack To Steal Credentials - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
9 months ago Gbhackers.com
GNOME Remote Desktop Flaw Let Attackers Read Login Credentials - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
8 months ago Gbhackers.com
User ID Verification Service for TikTok, Uber, X Exposes Admin Credentials - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
7 months ago Cybersecuritynews.com
New Malware "BunnyLoader 3.0" Steals Credentials and Crypto - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
11 months ago Hackread.com
New Vulnerability "LeakyCLI" Leaks AWS and Google Cloud Credentials - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
10 months ago Hackread.com
Thousands of UEFA Customer Credentials Sold on Dark Web - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
7 months ago Hackread.com
Hackers Moving To AI, But Lacking Behind The Defenders In Adoption Rates - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
9 months ago Gbhackers.com
Using Scary but Fun Stories to Aid Cybersecurity Training - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
8 months ago Securityboulevard.com
NFTs magnets for fraud, but not terrorists, says US Treasury The Register - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
8 months ago Go.theregister.com

Latest Cyber News


Cyber Trends (last 7 days)