Issue 86: Tracking Media Provenance, Digital Classroom Surveillance, Don't Pixelate to Redact, Android In-App Advertising
I've deleted what I originally had here as newsletter-opening-banter. These are serious times. I think the world has radically changed overnight, and roughly 7.9 billion of us are not in positions to do anything about it. To those that are in positions to do something about it and to those that are caught up in the effects of one man's decision to impose his will on others: may you be safe, may you succeed, and may you find peace. For those coming to this after early 2022, yesterday Russia invaded the sovereign country of Ukraine. Russia invaded the sovern country of Ukraine
The threads this week:
- Specification for Media Content Provenance
- Encroaching on Digital Privacy in the Classroom
- Pixelation for Redaction → bad
- Google Changes Up In-App Advertising
Feel free to send this newsletter to others you think might be interested in the topics. If you are not already subscribed to DLTJ's Thursday Threads, visit the sign-up page. If you would like a more raw and immediate version of these types of stories, follow me on Mastodon where I post the bookmarks I save. Comments and tips, as always, are welcome.
Specification for Media Content Provenance
This is a fascinating development. Although the target audience for this technology is news organizations and citizen journalists to provide a way to establish the creator and editors of media, one could easily envision using this standard to mark images, video, and audio from digital archives. As a way of combatting problems like manipulated media and "deep fakes", the specification would allow news organizations to cryptographically "sign" the media in a way that a display tool—via a media tool on your device or a browser plugin—would be able to decode and display to the viewer. If the cryptographic signature doesn't match the one published by the news organization, you would know that the media has been changed. Or, from the perspective of an activist or citizen journalist, the capture device—be it a smartphone or digital camera—could add indelible information to the media file that shows where and when it came from.
The C2PA website has a recording of a 90-minute webinar introducing the specification. Some quotes from that webinar:
At the point of recording, typically on a mobile device, when you hit the record button, you grab the date and time, the GPS location, all the pixels, you create a hash or digital compact signature, you cryptographically sign that. And essentially that is a stamp of authenticity put either by the hardware or software at the point of recording. And nobody is in a better place to authenticate content than exactly at this point of recording.
And later:
If an edit is made in a system without C2PA then the consumer is notified by a missing or incomplete message in the content credentials. C2PA also uses a failsafe for recovery in case of malicious or accidental stripping of providence information. It can always be recovered and matched again with the photo. By comparing the changes made along the way, viewers get a more complete picture of how the content came to be.
There are some serious privacy concerns, but they have accounted for some issues in the specification:
Privacy is one of the foremost guiding principles of C2PA. One of the most important principles is privacy. This is all intended to be opt-in; the guidance documents and the UX task force looked very carefully at ensuring that users of the technology and the producers on the creator side understand what they are doing, when it should be used, and when it shouldn't be used...
There is a notion of redaction that is baked into the standard that doesn't compromise the cryptographic certainty of what has gone before.
So that's interesting. See how it could be used for digital archives? I haven't finished reading the specification, but I have made some Hypothesis annotations on the "explainer" and "technical specifications". Join me there, would you?
Encroaching on Digital Privacy in the Classroom
The use of virtual learning tools has been subject to the fluctuating pandemic and schools' virtual status, with the Omicron variant causing many colleges to move online for final exams and the beginning of the spring semester. As COVID-19 continues, students have been increasingly subject to excessive monitoring technologies—whether proctoring exams or scanning files—such as Proctorio, ProctorU, and Perusall.
This article is from the Georgetown University student-run newspaper, and it contains perspectives from students about the invasiveness of the surveillance technology being used in classrooms. The emergency measures put in place for at-home learning during pandemic closures are weaving their way into the fabric of college life, and not in a good way. This article is a good one to read because it is written by students that are impacted by this technology, but it is just one among many similar articles that describe the technical problems and the cultural impacts.
Pixelation for Redaction → bad
The solution, in retrospect, seems obvious: figure out the font being used, deduce the offset from where the pixelation starts, build a model of letters of the alphabet pixelated to those parameters, and compare with the source material. I won't be using pixelation again.
Google Changes Up In-App Advertising
This one is mostly for the technical-minded readers. I wasn't around at the start of computing, but I've been around long enough to respect the growing sophistication of software development and how layers of the technology stack that are innovative now become assumed-to-exist in just a short while. What is fascinating about this technique from Google is that the creators of the Android operating system are abstracting out a whole segment of dynamic code libraries. In this case, the advertising tech will be distributed in self-contained blobs that are published by distinct companies. At the time an app is installed by the smartphone user, the app code and advertising code are put linked together and sent to the device. Once on the device, the ad-tech runs in a separate sandbox from the browser—it is isolated from the app code and has its own permissions structure. It is not hard to imagine that this technique will be used for other dynamic parts of an app.
Close Supervision
I am the caretaker this week for some newly planted seedlings in the basement. Among my tasks is to spray them with water to keep them moist and growing. I was doing just that earlier this week when I felt this tap from behind. Alan was checking my progress and had a few unsolicited suggestions. A couple of scratches behind the ears—well, more than a couple—and all was well again.
Seriously, the darn cat reached through the open stairwell, looked me straight in the eye from his elevated position, and meowed insistently in my face for attention.
The nerve of some beasts!
I should have followed his suggestions, though...I think a couple of the seedlings aren't going to make it.
Thursday Morning Addition
After I finished writing Wednesday night but before publishing Thursday morning, Russia's president gave the order to invade Ukraine from the north, east, and south. Geopolitics aside (Putin's actions are not warranted and by accounts I've read his interpretation of history is wrong), there are real effects on real people that don't deserve to be caught up in what has happened. To FOLIO Project colleagues—notably the EPAM staff located in and around Ukraine—I am thinking about you and praying for your safety and the safety of your family and friends.