Also want to talk about the blind watermark on some Chinese social medias, to track user across different platforms.
It's extremely dangerous when someone post those screenshots with their identity to something like twitter, since twitter is blocked in China, and the police can catch and charge you if they can proof you have the account on those platforms.
The best way to defeat that is turning screenshots into pure white and black, works with text, not work with pics.
... And it's too late, I'm on the bed. I'll keep talking this tomorrow (if I can remember).
I talked about this with my friends. This is not the first time that a blind watermark has been used to track the flow of info. They usually are used in enterprise situations, where you want to know who takes a screenshot of the internal IM app and sent on the internet, and I think this is acceptable.
However, tracking regular users is kind of crossing the line. After 30 minutes of diving into the steganography and blind watermark, I think most apps use the blind watermark when dealing with screenshots.
Steganography like LSB or jstep, or even 2D Fourier transform, is not practice. Thinking about LSB or jstep. I post a photo on qoto. No matter your client, it's a small picture on your device. You take a screenshot of what I said with that pic. With this significant scaling, I think most info is lost. With 2D Fourier transform (add high-frequency info to the pic), it would be hard for an app to do this, since they cannot change how Android or iOS render the button, etc. However, I think a modified ROM or hardware can output something secretly when taking screenshots or photos. A simple solution is to encode the Google/Xiaomi/Huawei account id, or IMEI in the screenshot or the photo, and considering this is not a massive amount of information, it shouldn't cause too much interference to the pic. And since it's system/hardware level, it's hard to notice.
The more common way is the blind watermark, aka, an invisible layer with graphical info, like text, on top of the app. The invisible layer tends to use 0.5% transparency, so it can't be detected by the naked eye. However, if you apply a random color map, aka map each color to a random color, the similar, hard-to-detected color will be mapped to a different color, which is likely to be easily detected.
As far as I (and other people on the internet) know, only the watermark is used to track people in public, based on how many things can the target platform control (mostly App).
So, how can I know if my Windows/Android/some social media platform is tracking me or not?
I don't know. You don't know. Only they know. Since it's a blind watermark or steganography, by design, no one should notice and know the existence of the hidden info, unless they know the mechanism beforehand. The LSB, 2D Fourier transform, jstep methods are old and known by the public. However, it would be easy to develop their way, maybe from scratch, or based on advanced research and paper.
The best way to defeat is turning your screenshots into only white and black, aka binarize. By doing so, all info in the pic will be significantly decreased, while the text on the picture can still be read. This method doesn't work with pictures. Another way to defeat it is taking a photo of your screen, but it's not 100% time working. People have tools to remove hidden info in the picture, and they released their code on GitHub. However, I want to warn you that they are not 100% working. They can only handle the watermark/steganography they know. Just like virus scanning, they can only find the patterns they have already known. You must develop your own methodology to keep yourself safe, like no login if not required, using proxy/vpn/tor, using a virtual machine, describing what you see instead of sending a screenshot, etc.
Automated tools can't solve everything. That's why we need security researchers and people at EEF to keep watching on all possible threats.
(This is the end of the thread)
Yeah, I know similar things in the cinema, where the publisher uses a special machine to insert a unique id or something as a watermark in real time when the movie is playing. It's mainly used to identify the uploader record the movie in which cinema at what time. For copyright protection, this is a totally great technology.
But for tracking civils? 🤔
Copyright on movie seems not very effect. I still collecting BD remux I didn't pay for, and running a BT seedbox.
However, the gaming industrial use it a lot. Nintendo is still actively stop people from rip the data off from their purchased game cartridge, even if that's the only way to preserve the history and make the game available to future generations. But Nintendo don't care this, and they take down sites and passages by issue copyright complains.
Generally speaking, I don't want other people to abuse my content (video, code, concept, etc.), but I do like people using their own way to preserve it.
----
Also, the software that applies random color map, it's not hard to write one, using JavaFX and the raster, I think it's fairly easy without thinking about optimizing the algorithm. However, I know a Chinese website do this: stegonline.iculture.cc
You need to upload a file by clicking “上传图片” (which basically means "upload picture"), then you got a bar that you can switch different mode by clicking "<" (previous one) or ">" (next one).
I never heard about Machine Identification Code before, but I feel pretty uncomfortable when this device can mark and track things without letting me know.
@skyblond
Welcome to modern tech !
Tech does plenty of things you don't see !
People are using it increasingly to do faster things and it's getting more out of your control and you get less options that respect you.
Tech = Take it of leave it ultimatum (almost) as we see with 'free' resources that need free self-abuse or get nothing... so pay for all of it yourself or go to google/amazon 'free' space!)
As tech *and people behind it* progress it become more of a -
Sad but natural with all the tools that it is given/sold and then restricted / held against you
(paper, cameras, computer = evidence / surveillance)
A natural tech life-cycle perhaps from AH WOW to OH NO,,, PLEASE NO I HAVE CHILDREN...!
Because in the hands of humans dictating tech's design and direction this bound happen after the honeymoon or beautiful wonderful discovery stage... and then into the over-use and overkill stage like warplanes and tank made everywhere.
ABOUT GAMES:
I find the game saves and all that side is a waste of time / killing time... so I appreciate a video about it but playing it ? No...
STOP!... Get that phase over and out... get to the real games and people interaction...
I think that's the short version of my advice, pardon my brevity... I wish that younger generations found more worthy games in fediverse interactions... rather than empty solo games or multiplayer solo games.
Thanks for the website tip...
All actions reduced I think will help need less worry... Sometime less activism... and more real understanding 1 to 1...
I guess people are the real work / game that is needed to happen more often than playing games...
Humans are not perfect but have advantages of being less controlled as computers / media (the brain carries a lot and has it's own memory, storage, autonomous action etc...).
Computers etc should only assist perhaps and loop back to people... send some messages on Mastodon and then get chatting... that's all until it's anything better elsewhere !
@skyblond @khird
My answer to copyright is
"let go or be dragged..."
-No more Hollywood movies (since many years now anyway for space and distraction reasons!) <--- all becomes better aligned the more they take it back / make it harder
- Using downloads from the past (or what I have already)
- Making my own movies / clips / compilations and using my time for my stuff or the free music and movies out there.
Was a great thread to realise a while ago:
"it was never our material anyway and part of Hollywood culture / Another For-Profit thing"... and eventually:
"let it go or be dragged..."
Again good thread.
----------------
After-thoughts
----------------
1- Can many software apply a "random color map"? (Would be good to list some.)
2- Printer dots on output identify printer (software needed to undo)
(aka Machine Identification Code)
https://en.wikipedia.org/wiki/Machine_Identification_Code