Comment by TZubiri
1 month ago
I think there's a lot of precedent for invisible watermarks for source identification in both copyright protection and exfiltration identification. Of course this is quite possible without compute intensive ML models.
1 month ago
I think there's a lot of precedent for invisible watermarks for source identification in both copyright protection and exfiltration identification. Of course this is quite possible without compute intensive ML models.
No comments yet
Contribute on Hacker News ↗