BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.nsec.io//NMAM88
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-2026-NMAM88@cfp.nsec.io
DTSTART;TZID=EST:20260514T113000
DTEND;TZID=EST:20260514T120000
DESCRIPTION:We can't trust the images and videos we see online anymore. Rec
 ent generative AI improvements support the creation and modification of co
 nvincing digital media in quasi real time. We live in an era where these f
 akes are routinely shared online to influence public opinion\, even by ele
 cted officials themselves!\n\nFortunately\, technologies exist to embed cr
 yptographic signatures and watermarks in these digital assets\, proving th
 eir origin. The [C2PA](https://c2pa.org/) specification is being adopted b
 y many technology providers\, camera manufacturers\, and news media organi
 zations. Major deployments have started in 2025 and will accelerate in 202
 6.\n\nIn high-risk contexts (conflict zones\, protests\, corruption report
 ing) creators might be reluctant to share certified images and videos for 
 fear of retribution. Is there a way to reconcile the need for authenticate
 d assets and the privacy of their creators? The answer is yes!\n\nIn this 
 talk\, we'll explore cryptographic options to provide privacy to those who
  capture and share digital assets\, enabling anonymous yet verifiable cont
 ent. We'll present an open-source prototype that augments the C2PA specifi
 cation by using blind signatures and zero-knowledge proofs to hide the sig
 ner's identity. These technologies offer the best of both worlds: enabling
  the public\, reporters\, and whistleblowers to share sensitive authentic 
 digital media with strong privacy protections\, which would increase trust
  in our content ecosystems.
DTSTAMP:20260507T213631Z
LOCATION:Ville-Marie
SUMMARY:Doxxing-proof authentic digital media: trust the asset\, protect th
 e source - Christian Paquin
URL:https://cfp.nsec.io/2026/talk/NMAM88/
END:VEVENT
END:VCALENDAR
