Wednesday, June 10, 2009

[xzumbnoj] Excising camera

Consider a public camera which initially one would think is the worst case scenario: the camera is tied to a vast database of biometric (e.g., gait) and other data (it also detects radio emissions from your electronic devices), perhaps it notices you using some sort of identifiable card or token, etc. The camera automatically uses many means to identify you.

When it identifies you, it automatically excises you from the footage, replacing it with a placeholder encrypted with your public key. Philosophically, images of you, identifiable as you, even if taken in public places, belong to you, and may not be viewed by Big Brother without your permission (private key).

So if a crime was committed against you, you can unlock the footage to help discover the perpetrator. But only if it's in your best interests.

We require a bit of cryptography magic to encrypt something with a public key so it cannot be identified which public key it was without the corresponding private key. This should be easy.

There is also a messy problem of spatial and temporal locality of the region surrounding your videoed image.

Make the law that any public "smart" camera continually (or capable of continually) identifying people must excise identified people. "Dumb" cameras don't have to. It requires a warrant to watch a particular person not to excise.

No comments :