Time for smartphone makers to ship verified video capture
roadtoartificia.com"Democracy depends on free speech, separation of powers, and smartphone camera design.
[...]
These technologies are tied together in a chain of trust, such that each layer verifies the next. In iOS systems, this chain begins with the Boot ROM, which is a piece of unchangeable code that is the first code to run each time the system starts. Each of the later pieces of software that are loaded are signed in a way that can be verified by the previous layer. So the Boot ROM can verify the bootloader’s signature, which can then verify the OS kernel signature, which can verify extensions and device drivers, etc. The real way it works has further protections and complexities, but this is the basic scheme.
[...]
Wouldn't it be great if smartphones became unassailable sources of truth?"
no...people are voting for convicted felons...do you think they care about sources of truth?
Actually kind of terrifying in a fascist context: Leakers, witnesses and whistleblowers recording evidence could be identified and persecuted with such a scheme. Kinda like how reality winner or whoever got busted by those invisible dots marking which printer was used to make copies of secret documents.
Actually this is addressed in the article. Unique signing keys per capture or per short rotation period.