Comment by TZubiri
2 months ago
I think there's a lot of precedent for invisible watermarks for source identification in both copyright protection and exfiltration identification. Of course this is quite possible without compute intensive ML models.
2 months ago
I think there's a lot of precedent for invisible watermarks for source identification in both copyright protection and exfiltration identification. Of course this is quite possible without compute intensive ML models.
No comments yet
Contribute on Hacker News ↗