The consequences for people involved in all manner of illegal political activity could not be clearer- DO NOT rely on technology to protect you online or in using telecommunications. It's simply too risky that the police can in future access communications which today they cannot. After all, they target people and keep records of electronic communications for good reasons. Not to make people paranoid, but this is a wakeup call for anyone involved in risky activity. Don't get caught doing something stupid.
From the Guardian article:
"Techniques are always developing," he said. "What is impossible today is possible tomorrow. There were several attempts to clear the face ... We are sure that you can't get better pictures and the people in his neighbourhood - family friends, colleagues, whatever - they will recognise him."
Mr Persson added that he had opposed making the photos public because it demonstrated to criminals that police could now unblur pictures, but that consideration and the risk the man could face public humiliation or violence were outweighed by the desire to protect children.
"It was a long discussion," he said. "We can't just sit here and do nothing. We have exhausted all possibilities within police work to find this man ... This was the last step."
Comments
Hide the following 6 comments
Sloppy Work
13.10.2007 08:07
Even if the spiral encryption algorithm used in the example had been applied several times, using a different axis on each pass, superimposed on the previous encryption product, the final product would still have betrayed its method, and the multiple spiral scramblings could have been unpeeled back to the original source photo.
A more robust encryption process would involve a more thorough, pseudo-random scrambling of the bits/pixels of the original photo by some equation that isn't so graphically apparent in the final product. More security could be obtained by successive encryptions (encrypting the encryption) using a variety of equations applied variously to parts of previous successive encryption products.
In other words, state security forces can't be said to have closed the book on image encryption as suggested in the orginal article posted above.
The purpose in the example wasn't (apparently) to protect information from detection from unauthorized eyes, ensuring revelation of the original to only authorized recipients. (In that case, the more complicated the encryption process, the more burdensome and corruptible it would be to decrypt.) Since the apparent purpose in the example was to obscure identity from all eyes, forever, a very complex, convoluted encryption process would carry no security/complexity trade-offs.
(It almost appears that the alleged perp, in his alleged photo, was engaging in the detective story cliché proverb: that self-absorbed clever outlaws--heros and villains, alike--like to brag. It seems that he wanted to "be cute", show how "clever" he [thinks he] is, daring someone to catch him. If he really wanted to remain anonymous, he would have done a more thorough job of concealing facial identity.)
I agree that the less reliance on the false "holy grail" of technology, the better. Primitive, one-time pad encryption beats the most tech-intense encryption every time.
alt0156
by the way...
13.10.2007 08:12
Sleepwalk
addition to sloppy work
13.10.2007 10:41
geek
The Photo
13.10.2007 10:42
Photographer
try and uncrypt
13.10.2007 14:37
hmm
What about putting a black circle over the face?
10.05.2009 04:01
Also, word to the wise, a good tip if you're putting out photos where you've obscured the faces is to do a screen capture of the image and then distribute that screen capture image of the photo rather than the original file, this helps to eliminate possible identifying traces that would be in the original image file.
hm