As any discerning [H]’er knows, we always wipe the fingerprints off the gun and leave it at the scene of the crime. You never want to put yourself in the situation of actually being in possession of a firearm used in a crime. “Dad, why did Tony Soprano throw the pistol down on the ground, by the body?” Exactly. The University of Buffalo is now saying that it can “barrel match” pictures to a specific phone. No kidding. Never send a “sensitive” picture without scrubbing it first. You guys know what I am talking about. Anyway, as long as pics are being saved as JPEGs, the guys in Buffalo are wasting their time. Rookie mistake territory.
The protocol defeats three of the most common tactics used by cybercriminals: fingerprint forgery attacks, man-in-the-middle attacks and replay attacks. It was 99.5 percent accurate in tests involving 16,000 images and 30 different iPhone 6s smartphones and 10 different Galaxy Note 5s smartphones.
I have not been caught with a sidearm or rifle yet, damn sure not gonna get caught with a phone. Can you imagine having to throw away your phone after every dick pick? That is going to get expensive. Guess I better head to Walmart and get a prepaid flip. Honestly, I did not read the article and just wanted Asia on the news page.
Discussion
Source: [H]ardOCP – Wipe Off Your Picture