Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Friday December 16 2016, @05:34PM   Printer-friendly
from the what-photos? dept.

The Freedom of the Press Foundation has called on professional camera makers to implement encryption in cameras to prevent governments from easily searching and seizing the contents:

An open letter written by the Freedom of the Press Foundation and signed by over 150 filmmakers and photojournalists calls on professional camera makers such as Nikon, Canon, Olympus, and Fuji to enable encryption to protect confidential videos from seizure by oppressive governments or criminals. The Freedom of the Press Foundation is a non-profit organization that has several noteworthy members, such as "Pentagon Papers" Daniel Ellsberg, Edward Snowden, and EFF's co-founder John Perry Barlow, on its board of directors.

[...] Filmmakers and photojournalists that film documentaries or shoot photos of abuses committed by governments or terrorists in dangerous parts of the world are constantly under threat of having their videos and photos seized and destroyed. The danger is even bigger when these bad actors can see what's on the cameras--it's not just the documentation of abuses that is exposed, but also the confidential sources that may have wanted to keep their identities hidden. Encryption would ensure those who seize their cameras couldn't see the contents of the cameras, nor the journalists' sources.

This won't necessarily ensure that the information collected by journalists is disseminated, since border agents and law enforcement officers can just destroy encrypted equipment. For that, cloud storage or live streaming features are needed, as well as reliable access to the Internet even during times of political crisis and network shutdowns.

Also at The Register, CNET, and TechCrunch (they also found a small cameramaker that is planning to ship on-camera encryption).


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by bradley13 on Friday December 16 2016, @06:20PM

    by bradley13 (3053) on Friday December 16 2016, @06:20PM (#442132) Homepage Journal

    You push your public key to the camera. All pictures saved on the camera are encrypted with that key. You need the private key (stored elsewhere, like on your home laptop) plus a password to unencrypt the pictures.

    I don't buy it. Photographers need to see the pics they take. If the pics are no good, they have to take more.

    At best, you could implement two levels of storage: open and encrypted. In the open state, you can look at the pics you just took. When you're happy with the pics, you push them into encrypted memory.

    Maybe. But how many non-technical people do you know, who successfully deal with public/private keys? Techies use them all the time, for SSH and such. Non-techies? I don't know any, not one.

    --
    Everyone is somebody else's weirdo.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by Nerdfest on Friday December 16 2016, @06:24PM

    by Nerdfest (80) on Friday December 16 2016, @06:24PM (#442135)

    As with so many things, you choose convenience or security.

  • (Score: 2) by bob_super on Friday December 16 2016, @06:47PM

    by bob_super (1357) on Friday December 16 2016, @06:47PM (#442147)

    So, you don't encrypt the picture before the viewing buffer, but you encrypt it when you write it to the card.
    You may just keep the last one unencrytped for review, leaving the phtotographer the choice of turning off the camera or taking a random pic just before handing the camera in, to clear it.

    Modern cameras have pretty deep buffers, because Flash only goes so fast. You'll have to declare a timeout on that.

    It's technically doable. Doesn't solve the $5 wrench, as someone already pointed out, unless you also add an unencrypted folder to which you write by pushing a different control: "See officer, I didn't see nothing anyone did, cuz I was fascinated by them seagulls back there. Look at the timestamps, that's all I took in the last 30 minutes, guv!"

  • (Score: 2) by dyingtolive on Friday December 16 2016, @06:55PM

    by dyingtolive (952) on Friday December 16 2016, @06:55PM (#442153)

    As an amateur (read: clown who bought a mid-range DSLR) photographer, I sometimes read articles from actual photographers offering tips. Most of them say to not spend too much time looking at the pictures on the screen, and to spend more time taking more pictures, from different angles and lighting, and look at the pictures later. Maybe that's crap advice. I can't say.

    Perhaps a compromise is that after a period of time, say, 5 minutes, the photos become encrypted? Cameras have a pretty decent battery in them usually. Maybe leave pictures unencrypted, but have an "oh shit" button that triggers an encryption of all the photos taken that aren't yet encrypted? As the aforementioned clown who doesn't know what he's doing, I do know that pictures are generally very, very large, especially if you're taking pictures worth looking at later. Encryption after the fact would probably take a long time unless you had some processing power behind the effort.

    I'm still kinda thinking that the best way to go is to pull the pictures off on your laptop, encrypt, and then put them on a sd card you toss into your shoe or something if you're that worried about it.

    --
    Don't blame me, I voted for moose wang!
    • (Score: 2) by Scruffy Beard 2 on Friday December 16 2016, @09:03PM

      by Scruffy Beard 2 (6030) on Friday December 16 2016, @09:03PM (#442204)

      To frustrate bad actors and authorities, the files should be encrypted before you run into trouble. Encrypting a 64GB card would just take too long.

      An "oh shit button" can me useful for deleting symmetric encryption keys from memory. As has been pointed out, with Public Key cryptography, the decryption key may be on another continent.

      • (Score: 2) by dyingtolive on Friday December 16 2016, @10:12PM

        by dyingtolive (952) on Friday December 16 2016, @10:12PM (#442243)

        Actually, it's kind of a moot point, at least for the preview function on my T5i. I just popped the sd card out and gave it a few clicks. It will display the preview even with no storage, so it's pulling that from buffer, not the card. Surprised it will even try to snap the picture without a card, but it at least warns you on-screen (assuming you have the screen flipped out).

        Of course, displaying AFTER that second or so initial preview might be tricky. I do agree that encrypting an entire card as whatever villain this scenario is worried about is walking toward you would probably be a bit too late though.

        --
        Don't blame me, I voted for moose wang!
  • (Score: 4, Insightful) by zocalo on Friday December 16 2016, @07:01PM

    by zocalo (302) on Friday December 16 2016, @07:01PM (#442157)

    I don't buy it. Photographers need to see the pics they take. If the pics are no good, they have to take more.

    Well, you *could* has a system that let you review the image before you commit it to encryption and storage, or take some test shots that are not encrypted to review, but that premise is flawed. Believe it or not, photo-journalists didn't typically cart around a processing lab so they could check their images in the field before digital came along; they checked their settings, took some pictures and hoped that when they got back to the office with the film and got it developed they hadn't screwed up. Most competent photographers don't actually *need* to chimp with digital either; it's just an additional safety net to confirm the camera settings are good, especially in challenging conditions, or to pass a bit of time when there's a gap in the action.

    But how many non-technical people do you know, who successfully deal with public/private keys? Techies use them all the time, for SSH and such. Non-techies? I don't know any, not one.

    Couple of issues with that. Firstly, the idea is presumably that the camera would do the bulk of the work - even entry level DSLRs let you load settings via files loaded via memory card/USB or to configure up some basic IPTC data to be applied to each image already, so it's not that much of a stretch in complexity to enable loading encryption keys to higher end models. Secondly your premise is again flawed; a modern photo-journalist working in the field typically *is* very technical and highly IT literate, as they often need to be be capable of troubleshooting and resolving non-terminal issues with cameras, laptops, phones, and getting connectivity in some extremely challenging environments and situations. They typically tend to be well versed in the use of data encryption tools, VPNs, getting around government Internet filtering systems, and so on, so this wouldn't be a new concept in the slightest - they are definitely not "non-technies".

    --
    UNIX? They're not even circumcised! Savages!
  • (Score: 2) by edIII on Friday December 16 2016, @09:53PM

    by edIII (791) on Friday December 16 2016, @09:53PM (#442232)

    It's not that hard. For the people who aren't technical you have an app that generates the keys and provisions the SD card or camera itself. Once there, you already got the idea for a delay. Allow 5 minutes, or some programmable duration, for review of images. If not deleted, they get encrypted and the cache is ready for the next pictures. When you get back home and transfer all of the images back to your computer, you run the app and it will decrypt all the images for you.

    It could be a module for Photoshop, GIMP, etc. Nearly every SSH program that I know is capable of generating keys and managing them. I'm pretty sure that the convenience can be maintained with a little bit of programming.

    --
    Technically, lunchtime is at any moment. It's just a wave function.
    • (Score: 2) by maxwell demon on Saturday December 17 2016, @01:23AM

      by maxwell demon (1608) on Saturday December 17 2016, @01:23AM (#442308) Journal

      Indeed, for employed professional programmers, their employer's IT department could generate the keys and load then onto the cameras. Indeed, that way the photographers can truthfully claim that they have never possessed or seen the private key.

      --
      The Tao of math: The numbers you can count are not the real numbers.