Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cryptographic components in cameras have roots of trust that can be compromised as well. Also, photos can be staged (many famous examples of this).

The only real solution is to build social infrastructure that helps people identify the trustworthiness of a source. Some efforts are being made in both the centralized and decentralized directions.



It turns out librarians and teachers teaching media literacy and critical thinking still has great value!

"Are the author's conclusions supported by the facts they present?" "Is their assertion internally consistent?" "What do you think the author is trying to make you feel and do by consuming this content?" "Is this a primary or secondary source?" "Can this be independently verified?" "Is the source credible?"




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: