gmrza said:rfdesigner said:non-isue.
How many peodophiles are caught red handed with the footage as they're shooting?
yes, secure writing to card ought to be a feature, even if only on the 1DXII. presumably that would mean you can't play it back on camera but can only see live images.
The real problem is going to be ensuring the encription is sufficent, what's the chances a "good enough" policy is taken which turns out not to be good enough.
Firstly, as you point out, any technology can be abused. In fact, to get to the root of the problem, with pedophiles, we should just ban cameras!
More seriously: it is a difficult technical challenge to implement encryption on cameras for a variety of reasons:
- It is not practical to have to enter a password every time you want to use the camera, and having things happen like locking the camera after a time-out
- You need encryption hardware which is powerful enough to encrypt HD video, and you will need additional battery capacity
- How do you deal with the issue of getting a camera confiscated when it is switched on, but not locked.
On the brighter side, the typical use cases of a camera make it possible to use public/private key encryption, such that only a public key, which is used to encrypt media is loaded onto the camera. Decryption would require the use of a private key, which is never loaded onto the camera. The private key would only be stored on the computer which is used to process the video. The private key can still be password protected. This would mean that a film maker could go do work in a risky area and shoot. It would not be possible to decrypt the media until returning back to the computer which houses the private key. For instance, if your camera was confiscated in airport security or customs it would be impossible for you to decrypt the media on your camera. - The only key you have with you (on the camera) is the key required to encrypt, but no ability to decrypt.
There is still the issue that authorities will not understand that "rubber hose cryptography" will not work.
you don't need to put a password in ever, a encrypting key, once, yes. You simply record such that what you put onto the card is encrypted. The screen can show you what it's writing, either last frame or current video frame, like shooting without a card, that can be unencrypted, but of course with no memory on the screen, there's no risk there.
you can't review in camera, should someone half-inch it there's no possibility of decoding as the camera has never known the key, no clever government memory retrieval process will help get the key out of the camera.
Someone can then snatch the camera while you're filming and not be able to recover what you've filmed, as there's no possibility of decode you can leave that back in your office, in another country and just email the encrypted data assuming no one has take it out of your hands of course.
Many encoding algorithms are designed to encrypt "live" steams, that is to protect live data, they are usually breakable, but not if you have to search the entire radio-space and don't know what you're looking for as they demand a lot of computing power to crack, in this case you need top end encoding as they can put a cray on it day and night for weeks to get the data, so clearly you'd need a dedicated chip to keep power demands reasonable.
Additionally who needs 1080p for this feature?.. this is for taking evidence. 480i would be more than good enough in many cases, less raw data means encoders can work substantially slower (cooler), if there's enough efficiency then fine have 1080p, my point is this isn't for cinema.
Upvote
0