150 Filmmakers Ask Canon & Nikon to Sell Encrypted Cameras

gmrza said:
rfdesigner said:
non-isue.

How many peodophiles are caught red handed with the footage as they're shooting?

yes, secure writing to card ought to be a feature, even if only on the 1DXII. presumably that would mean you can't play it back on camera but can only see live images.

The real problem is going to be ensuring the encription is sufficent, what's the chances a "good enough" policy is taken which turns out not to be good enough.

Firstly, as you point out, any technology can be abused. In fact, to get to the root of the problem, with pedophiles, we should just ban cameras! :-)

More seriously: it is a difficult technical challenge to implement encryption on cameras for a variety of reasons:
  • It is not practical to have to enter a password every time you want to use the camera, and having things happen like locking the camera after a time-out
  • You need encryption hardware which is powerful enough to encrypt HD video, and you will need additional battery capacity
  • How do you deal with the issue of getting a camera confiscated when it is switched on, but not locked.

On the brighter side, the typical use cases of a camera make it possible to use public/private key encryption, such that only a public key, which is used to encrypt media is loaded onto the camera. Decryption would require the use of a private key, which is never loaded onto the camera. The private key would only be stored on the computer which is used to process the video. The private key can still be password protected. This would mean that a film maker could go do work in a risky area and shoot. It would not be possible to decrypt the media until returning back to the computer which houses the private key. For instance, if your camera was confiscated in airport security or customs it would be impossible for you to decrypt the media on your camera. - The only key you have with you (on the camera) is the key required to encrypt, but no ability to decrypt.
There is still the issue that authorities will not understand that "rubber hose cryptography" will not work.

you don't need to put a password in ever, a encrypting key, once, yes. You simply record such that what you put onto the card is encrypted. The screen can show you what it's writing, either last frame or current video frame, like shooting without a card, that can be unencrypted, but of course with no memory on the screen, there's no risk there.

you can't review in camera, should someone half-inch it there's no possibility of decoding as the camera has never known the key, no clever government memory retrieval process will help get the key out of the camera.

Someone can then snatch the camera while you're filming and not be able to recover what you've filmed, as there's no possibility of decode you can leave that back in your office, in another country and just email the encrypted data assuming no one has take it out of your hands of course.

Many encoding algorithms are designed to encrypt "live" steams, that is to protect live data, they are usually breakable, but not if you have to search the entire radio-space and don't know what you're looking for as they demand a lot of computing power to crack, in this case you need top end encoding as they can put a cray on it day and night for weeks to get the data, so clearly you'd need a dedicated chip to keep power demands reasonable.

Additionally who needs 1080p for this feature?.. this is for taking evidence. 480i would be more than good enough in many cases, less raw data means encoders can work substantially slower (cooler), if there's enough efficiency then fine have 1080p, my point is this isn't for cinema.
 
Upvote 0
these days strong encrypion vendors must provide means of decryption or even decrypted clear text data to agencies on requiest. this is by law in _all_ western world countries and _all_ BRICS countries. in fact, in BRICS countries all encryption must be certified by relevant agencies and bodies. International device and software manufacturers are not interested in providing encryption facilities with their products as it creates enormous hassle for them on so many levels. the best that I would suggest to overcome this issue - stream to HDMI port and encrypt on portable storage device in real time. that takes the issue away from Canon and moves into the portable storage domain. It's a catch 22, I know.
 
Upvote 0
Alex_M said:
these days strong encrypion vendors must provide means of decryption or even decrypted clear text data to agencies on requiest. this is by law in _all_ western world countries and _all_ BRICS countries. in fact, in BRICS countries all encryption must be certified by relevant agencies and bodies. International device and software manufacturers are not interested in providing encryption facilities with their products as it creates enormous hassle for them on so many levels. the best that I would suggest to overcome this issue - stream to HDMI port and encrypt on portable storage device in real time. that takes the issue away from Canon and moves into the portable storage domain. It's a catch 22, I know.

sure?

Apple didn't exactly help recently if I recall.
 
Upvote 0
Well, I am industry insider for 15+ years. NSA will have the upper hand in this battle eventually one or another way. With such an enormous interception budget and countries such as: USA, Australia, UK, Canada and NZ cooperating internationally, one can be sure that the case will be brought forward or conveniently created to achieve what was required to achieve. pressure is ON. the message is: do not get in our way. And why any sensible international corporation would? It makes their life difficult for nothing. In fact many encryption vendors in Australia are now pushed to go on Defence Strategic Good List. what it means for those vendors that they can no longer even sell these strong encryption products or even demo the products without explicit permission from certain agencies. There is Mass Market Exception though. that sets mass market encryption product aside. But.. one of the criterias that has to be satisfied: encryption to be not stronger than 64bit.

P.S. if you would read the following document (and ideally - between lines) please, say, from page #10 "New Crypto War?" - just a few pages.. I am absolutely sure that you would recognise major points brought forward by the Agencies to support their claim. There is an elephant in the room, whatever makes National Security weaker has to be taken care of. yes, I know..

http://www2.itif.org/2016-unlocking-encryption.pdf

rfdesigner said:
Alex_M said:
these days strong encrypion vendors must provide means of decryption or even decrypted clear text data to agencies on requiest. this is by law in _all_ western world countries and _all_ BRICS countries. in fact, in BRICS countries all encryption must be certified by relevant agencies and bodies. International device and software manufacturers are not interested in providing encryption facilities with their products as it creates enormous hassle for them on so many levels. the best that I would suggest to overcome this issue - stream to HDMI port and encrypt on portable storage device in real time. that takes the issue away from Canon and moves into the portable storage domain. It's a catch 22, I know.

sure?

Apple didn't exactly help recently if I recall.
 
Upvote 0
Must be a slow day in rumorville... This will never happen through Canon.

150 filmmakers asking for this is like the outcry in CR forums for 'give me what I want'. 150 sales isn't even a blip on Canon's radar. If they can't sell enough to make profit it will never come to fruition.

The only chance is something like ML. Firmware hack to do asymmetric crypto and hope whatever DIGIC chip the body has can keep up. It would be a cool proof of concept, but likely ML's audience is interested other features.
 
Upvote 0
Extremely interesting and equally delicate problem.
A problem that can be looked at from many different directions:
1) Choice of algorithm (Open versus proprietary kinds)
2) HW- or SW-based algorithm
3) Encrypt the container that holds the data to be secured, or just the content inside the container.
4) Legal problems arising from trying to export and use certain encryption algorithms.
5) Camera makers to work on it alone, or perhaps a new standard that makes it possible for card makers to create a media storage that handles the encryption on the card. (Vaguely, something like the Eye-Fi, but instead of just sending out the file, you first encrypt it and then you send it. A "No-Eye" so to speak.)
6) Cost - benefit analysis. Is it worth it?

A few of the ideas that popped into my head when I first read about this last night. As anything that comes out of that place, it can be questioned or torn apart. But I do think it's a problem that's not as easy as it first seems.
 
Upvote 0
As much as this group of filmmakers do not want to hear it - this may be more of something for AJA, Blackmagic Design, Atomos, or Convergent Design to tackle. A 3rd party monitor that can record encrypted video with either password unlock, thumbprint scanner, etc. Then let the brains of that device handle all of the backup/redundancy or uploads to remote servers that need to be performed. For true encryption, all it would require is disabling in-camera recording and ONLY recording to the external device. Personally, not sure I'd be 100% comfortable disabling in-camera recording, but if the situation/project warranted that (and the client was on board) then maybe I would be ok.

There are times when working on projects under an NDA that I've wished for something similar, but then I remember that clients want things relatively fast and usually fairly cheap... it's just another step in the workflow chain that can (and probably will) break when it comes to crunch time to get a project out the door.
 
Upvote 0
Hillsilly said:
I use bitlocker (and previously truecrypt) on my computers. But anyone who follows this topic would know that there is always doubt about backdoors and special access for government agencies. I think the desire for an encrypted camera is worthy, but whether the camera makers would make a fully secure one is debatable.

Oh, and if such a camera came into existence, don't be fooled by an eventual Canon vs FBI court case. This is just psy-ops to make the less gullible feel that their device is secure. They're not.

I can imagine such a feature would be of use to people wanting to keep personal footage away from pickpockets and thieves. The movie "European Vacation" comes to mind.
It seems you downgraded your computers... No further comment on this....
 
Upvote 0
Hillsilly said:
c.d.embrey said:
2. Passwork protection is getting to the point that even the NSA can't brute-force them.
Assuming they haven't got their quantum computer working yet.
Imagine a video chip with 3584 CUDA cores on it, all running at 1.4Ghz.....
Now imagine 4 of those chips on a blade.....
Now imagine 16 blades in a chassis.....
Now imagine 8 chassis in a rack.....
Now imagine 16 racks.....

That gives you 128 chassis....
That gives you 2048 blades....
That gives you 8192 chips....
That gives you 29,360,128 CUDA cores....
That gives you 41,104,179 Giga flops.....

That's what you get with a modern supercomputer, and it is a fairly safe bet that NSA has more than one :)
 
Upvote 0
Personally, I would avoid encrypting my camera data... when something goes wrong, and it will, you are screwed. Also, data recovery software and encrypted files do not have a good history of playing well together....

If you really want to be safe from someone grabbing your cards and looking at your pictures, you are best off with no pictures on the card. Stream them to your phone and upload them "back home" as you go. Even if your card is encrypted, it will do you very little good.

For example, Let's say I am the "security person" and that I take exception to you having taken pictures of me and my buddy beating some protester..... I ask you to give me the memory card, and you either say yes, or you say no. If you say yes, you have lost the images.... if you say no, I beat you, take the camera, and remove/break the memory card, and you have lost the pictures....

You are at customs, I ask you to clear the encryption so that I can see the images on the card, you say no, I impound the card (and camera, phone, laptop, etc), and if you are lucky you get them back in a couple of weeks.....

I steal the camera, doesn't matter if they are encrypted or not, they are gone!
 
Upvote 0
This whole thread, populated as it is with well intentioned and technologically astute posters, is still quite truly missing the most important content from the OP. To wit, is it advisable, let alone feasible or likely to be granted, to ask for a camera company to offer a "nearly unbreakable" encryption option for recording on Canon's mid-to-high-level video cameras.

Everyone will have differing opinions about this, but for me, I don't see this as something I would want to wind up paying for, to serve other people's needs or desires. Even making it "optional" would spread the development costs to those not exercising such an option. For the literal one-in-a-million event in which a film maker might truly possess some footage that, like in some James Bond thriller, contains information critical to the public's safety that one's government would like to suppress, I think it would be the duty of the film maker to encrypt the footage in post, rather than make me pay for his "black swan" event.

Furthermore, this request has the whiff of much of the recent very common and annoying public "virtue-signaling," which has been roaring across our media for the last year or so, implying that those asking Canon have at least an occasionally superior grasp of what is vital to our understanding of culture and politics than the rest of the rubes with which they share space, thereby making their needs special and their request reasonable, despite its highly unlikely requirement in the course of professional, or even amateur, work.

Regards,
David
 
Upvote 0
Alex_M said:
Well, I am industry insider for 15+ years. NSA will have the upper hand in this battle eventually one or another way. With such an enormous interception budget and countries such as: USA, Australia, UK, Canada and NZ cooperating internationally, one can be sure that the case will be brought forward or conveniently created to achieve what was required to achieve. pressure is ON. the message is: do not get in our way. And why any sensible international corporation would? It makes their life difficult for nothing. In fact many encryption vendors in Australia are now pushed to go on Defence Strategic Good List. what it means for those vendors that they can no longer even sell these strong encryption products or even demo the products without explicit permission from certain agencies. There is Mass Market Exception though. that sets mass market encryption product aside. But.. one of the criterias that has to be satisfied: encryption to be not stronger than 64bit.

P.S. if you would read the following document (and ideally - between lines) please, say, from page #10 "New Crypto War?" - just a few pages.. I am absolutely sure that you would recognise major points brought forward by the Agencies to support their claim. There is an elephant in the room, whatever makes National Security weaker has to be taken care of. yes, I know..

http://www2.itif.org/2016-unlocking-encryption.pdf

rfdesigner said:
Alex_M said:
these days strong encrypion vendors must provide means of decryption or even decrypted clear text data to agencies on requiest. this is by law in _all_ western world countries and _all_ BRICS countries. in fact, in BRICS countries all encryption must be certified by relevant agencies and bodies. International device and software manufacturers are not interested in providing encryption facilities with their products as it creates enormous hassle for them on so many levels. the best that I would suggest to overcome this issue - stream to HDMI port and encrypt on portable storage device in real time. that takes the issue away from Canon and moves into the portable storage domain. It's a catch 22, I know.

sure?

Apple didn't exactly help recently if I recall.

thanks, yes I see what's going on. In my line of work encryption is limited to more basic levels where real time cracking is impossible simply due to volume.

one thought came mind that the video data could be streamed out of the cameras unsaved, then encrypted and saved on a laptop.. there must be a way of doing this?
 
Upvote 0
rfdesigner said:
one thought came mind that the video data could be streamed out of the cameras unsaved, then encrypted and saved on a laptop.. there must be a way of doing this?

Streamed? Not 100% sure, but unlikely to have a fully encrypted stream that can be recorded in full quality without dropouts or other issues.

Recorded via HDMI/SDI or other direct camera output? Absolutely.

AJA, Blackmagic Design, Atomos, and Convergent Design are the companies they should be targeting with this request. The external recorder market is probably most capable of delivering a solution that actually works.
 
Upvote 0
rfdesigner said:
thanks, yes I see what's going on. In my line of work encryption is limited to more basic levels where real time cracking is impossible simply due to volume.

one thought came mind that the video data could be streamed out of the cameras unsaved, then encrypted and saved on a laptop.. there must be a way of doing this?

I think you may be touching on a good alternative: if camera manufacturers offered a feature which allowed streaming of video out of the camera as it is shot, with no recording on the camera, this would open the door for third parties to provide encryption attachments which could then store the video encrypted.

This could have a number of advantages:
  • Camera makers (like Canon and Nikon) would not be perceived by governments as "aiding the baddies" by providing encryption. The feature could be marketed at those who need to store really large amounts of video - amounts too large to store on a memory card. - no mention of encryption in the marketing
  • This is a much cheaper feature to implement - Canon, Nikon etc. would not be burdened by the R&D and manufacturing cost of an encryption solution, and they would not have to defend demands by authorities to decrypt content
  • This would open up the market to open source encryption solutions - i.e. source code and designs could be published to allow review by industry experts - the Bruce Schneiers of this world
  • Different users could use different encryption solutions - taylored to their needs. Heck, you could even use wireless to stream the video to a colleague who is carrying the encrypted storage a hundred metres away!
 
Upvote 0
tron said:
It seems you downgraded your computers... No further comment on this....
I won't disagree. But I just want to ensure that people stealing my computer won't easily get access to the content. I'm not so concerned about plausible deniability of illicit content. Though, this topic has piqued my curiosity and I might take a closer look at VeraCrypt.
 
Upvote 0
rfdesigner said:
Apple didn't exactly help recently if I recall.
Surely that was just a PR stunt to convince baddies to leave content on Apple devices by convincing them that they are secure? These sort of stories are also good for sales - eg one of the main reasons people still buy blackberries is because of perceived uncrackable encryption.
 
Upvote 0
dafrank said:
This whole thread, populated as it is with well intentioned and technologically astute posters, is still quite truly missing the most important content from the OP. To wit, is it advisable, let alone feasible or likely to be granted, to ask for a camera company to offer a "nearly unbreakable" encryption option for recording on Canon's mid-to-high-level video cameras.

Everyone will have differing opinions about this, but for me, I don't see this as something I would want to wind up paying for, to serve other people's needs or desires. Even making it "optional" would spread the development costs to those not exercising such an option. For the literal one-in-a-million event in which a film maker might truly possess some footage that, like in some James Bond thriller, contains information critical to the public's safety that one's government would like to suppress, I think it would be the duty of the film maker to encrypt the footage in post, rather than make me pay for his "black swan" event.

Furthermore, this request has the whiff of much of the recent very common and annoying public "virtue-signaling," which has been roaring across our media for the last year or so, implying that those asking Canon have at least an occasionally superior grasp of what is vital to our understanding of culture and politics than the rest of the rubes with which they share space, thereby making their needs special and their request reasonable, despite its highly unlikely requirement in the course of professional, or even amateur, work.

Regards,
David

The most well thought out and reasonable post on this thread. (And, your pictures are damn impressive as well.)
 
Upvote 0
Bingo! can I just quote this guy here, just on the previous page? :D :D

http://www.canonrumors.com/forum/index.php?topic=31491.msg640882#msg640882

" .. the best that I would suggest to overcome this issue - stream to HDMI port and encrypt on portable storage device in real time. that takes the issue away from Canon and moves into the portable storage domain..."

any/ or almost any remote storage is capable off real time drive content encryption this days. so.. the solution available now: stream to HDMI and then to have service runing on the intelligent remote storage watching for new files and encrypt them as soon as they written to the storage media. very unsofisticated tech. Encryption does not require alot of processing power contrary to the popular believe. Audio / video encoding and stream compression is much more processing power hungry though.


rfdesigner said:
.. one thought came mind that the video data could be streamed out of the cameras unsaved, then encrypted and saved on a laptop.. there must be a way of doing this?
 
Upvote 0
A person says "I have a problem."
It is good to take them seriously, unless it isn't.
"And I want it fixed this way..."
Be very careful of taking that part seriously.
The problem statement is, "Sometimes I film, or shoot, stuff that has the potential to anger powerful and violent people. I wish to maximize the chance that the images can be retained and shared with others."
I accept the fact that that is a problem.
The suggested fix is misguided.
Encryption in camera does nothing. Physical security through stealth, misdirection, luck, or your own application of power and violence is required until such time as you have reached a place of relative safety. At that point it is time for you and the bits to part ways. Major camera manufacturers should have nothing to do with things at that point. Keep the cameras innocent, that will minimize collateral damage for ordinary folks.
It is also probable that the inconvenience of using an encrypted camera will induce users to use shortcuts and weak passwords to "fix" the inconvenience, thus breaking the security.
 
Upvote 0