Questions tagged [video]

Any method of storing, transmitting or playing motion pictures.

56 questions
58
votes
12 answers

Is it possible to make a video that is provably non-manipulated?

Suppose a student takes an exam at home. Since home-exams are prone to cheating, the student wants to be able to prove that he/she did not cheat. So the student puts cameras in the room, which videotape the room during the entire exam. Now, if the…
Erel Segal-Halevi
  • 1,105
  • 2
  • 9
  • 11
22
votes
3 answers

Is it possible to transfer a virus through browser video?

I know that there is already a question related to viruses in videos, but the implication in the other question is that videos in question have been downloaded and played by media software on the target computer. The answer for that question is that…
Stumbler
  • 503
  • 4
  • 7
21
votes
4 answers

Is VLC on Linux vulnerable to an attack from .wmv files designed to install viruses?

I was stupid and did not check a video file I downloaded from an untrustworthy source. It was .wmv file with no readable properties of the video. I know that .wmv videos can download viruses. What I don't know is if they can do this to VLC on Linux…
user
  • 817
  • 10
  • 16
20
votes
9 answers

Could videos be authenticated using private and public keys?

I saw a news report about now freely available software to make "deepfake" videos. Couldn't videos be internally marked using a private key, so that everyone could verify the originator using a public key? This could be built in to browsers so that…
13
votes
1 answer

How do HTML5 DRM addons protect their output?

HTML5 has a DRM framework Encrypted Media Extensions (EME), that allows DRM companies to create content decryption modules (CDM) to decrypt DRM protected content. Browsers should use a sandbox to run the CDM, so that security holes that allow access…
allo
  • 3,173
  • 11
  • 24
13
votes
4 answers

What to look for in baby monitor?

There are, from time to time, stories in the media about baby monitors being hacked. The hacker can for example gain access to the video feed and be able to interact with the monitor. While I understand that completely protecting yourself from any…
Thomas
  • 3,841
  • 4
  • 22
  • 26
12
votes
1 answer

How does HDMI splitter bypass HDCP?

I just read this article. It's about HDCP and how some old HDMI monitors would not work with your newer devices (such as game consoles, etc) because newer devices protect video stream content in a way that blocks old monitors from displaying it. I'm…
Andrew Savinykh
  • 1,630
  • 3
  • 14
  • 22
11
votes
1 answer

How to check if an mp4 file contains malware?

I am not that familiar with security and malware analysis, but I know it is theoretically possible to embed a malware into files like video, audio ... Say that someone managed to embed a malware into an mp4 file and send it via gmail. I have the…
singrium
  • 213
  • 1
  • 2
  • 8
10
votes
1 answer

How can faulty version of an iOS app (such as WhatsApp) expose the whole device to crashes or take-over

There was a lot of recent, prominent news about a security vulnerability in WhatsApp that affects also iOS versions of the app. The volnerability has been described as carrying the risk of an attacker crashing the device (e.g. mentioned in the…
rookie099
  • 213
  • 1
  • 6
9
votes
1 answer

Tails OS doesn't erase video memory

As stated succinctly in the Tails "Known Issues" page: Tails doesn't erase the video memory yet. When one uses Tails, then restarts the computer into another operating system, that other operating system can see what has been displayed on the…
esote
  • 371
  • 2
  • 12
8
votes
1 answer

How to mitigate risk of X11 buffer ghosting (palinopsia bug)

The Buffer "Ghosting" Phenomenon It is possible to observe contents of (old and currently used) graphics buffers on a monitor under certain circumstances, posing an information disclosure risk, when combined with shoulder surfing: Growing a Window…
user66981
5
votes
1 answer

In a physical pen test, is there a way to figure out FOV of a tinted dome camera?

With bullet cameras, this is easy. You look which way they are pointing and then either guess their FOV, or even look them up based on how the model they appear to be. Most dome cameras are behind tinted glass and it's hard to see where they are…
user3280964
  • 1,130
  • 2
  • 7
  • 13
5
votes
3 answers

Is a cryptographically signing camera possible?

What kind of digital / cryptographic signing would make it possible to create a camera that cryptographically signs the photos it takes so that the images can be verified to have been taken with that specific camera? The motivation is that if the…
5
votes
1 answer

How does video protection work when someone is recording their screen?

I forgot to turn my video recorder off and accidentally recorded my screen when I watched some series on some website. When I re-watched the video a few weeks later, I noticed that the part where the series was played (on full-screen) was a totally…
user168683
5
votes
1 answer

Malware through HTML 5 player

Just curious if it is possible to get malware through a trusted site hosting an HTML 5 player. I would imagine since Chrome is in a sandbox, nothing download to your computer?
Kellen Stuart
  • 239
  • 2
  • 9
1
2 3 4