Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. memes
  3. Benefit of the hindsight

Benefit of the hindsight

Scheduled Pinned Locked Moved memes
memes
143 Posts 81 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • A [email protected]

    That’s the point, a use case where no one has to. It’s only the record of ownership.

    And clearly you’d still need to make arrangements to prevent multiple chains of ownership for a copied artifact

    NFTs make the mistake of assuming that somehow makes it unique, forgetting you can just copy the original. However these use cases work from the opposite direction: given an accused infringement, does that match?

    Consider the current use case for trademark. Someone creates a trademark and registers with an authority. At some point they may renew modify, or sell. After some time, that authority has a database containing the original and a chain of ownership. Blockchain could serve this identically, with the potential advantage of the chain being self contained and distributable

    M This user is from outside of this forum
    M This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #141

    That is not how the chain has worked or could ever work. There is a reason after over fifteen years people are still speculating how blockchain can be useful.

    1 Reply Last reply
    0
    • S [email protected]

      No, it is not security through obscurity. It’s a message signature algorithm, which are used in cryptography all the time.

      Yes it is. The scheme is that when you take a picture, the camera signs said picture. The key is stored somewhere in the camera. Hence the secrecy of the key hinges on the the attacker not knowing how the camera accesses the key. Once the attacker knows that, they can get the key from the camera. Therefore, security hinges on the secrecy of the camera design/protocol used by the camera to access the key, in addition to the secrecy of the key. Therefore, it is security by obscurity.

      M This user is from outside of this forum
      M This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #142

      And how do they get the camera? You could make the same exact claims about SSH being useless because "if an attacker gets the key, it's over!"

      NO SHIT!!

      S 1 Reply Last reply
      0
      • M [email protected]

        And how do they get the camera? You could make the same exact claims about SSH being useless because "if an attacker gets the key, it's over!"

        NO SHIT!!

        S This user is from outside of this forum
        S This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #143

        They buy it at a store.

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups