Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
ummonk
2y ago
0 comments
Share
Just use a certificate chain. The manufacturer can provide each camera its own private key, signed by the manufacturer.
0 comments
default
newest
oldest
explaininjs
2y ago
And when the sensor bus is hijacked to directly feed “trusted” data into the processor?
ummonk
OP
2y ago
Then you can examine the specific camera and try to prove it has been tampered with. At least you know exactly which camera to look at.
j
/
k
navigate · click thread line to collapse