diff --git a/sitemap.xml b/sitemap.xml index 0e98ba7..84f9ffc 100644 --- a/sitemap.xml +++ b/sitemap.xml @@ -2,42 +2,42 @@ https://c2pa.org/specifications/specifications/1.4/attestations/attestation.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.4/decoupled/Decoupled.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.4/index.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.4/specs/C2PA_Specification.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.4/ux/UX_Recommendations.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.3/ai-ml/ai_ml.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.3/explainer/Explainer.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.3/guidance/Guidance.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.0/security/Harms_Modelling.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z https://c2pa.org/specifications/specifications/1.0/security/Security_Considerations.html -2023-12-22T14:42:18.037Z +2023-12-22T14:46:14.552Z diff --git a/specifications/1.0/security/Harms_Modelling.html b/specifications/1.0/security/Harms_Modelling.html index 4b855c9..7b502a9 100644 --- a/specifications/1.0/security/Harms_Modelling.html +++ b/specifications/1.0/security/Harms_Modelling.html @@ -132,7 +132,7 @@

C2PA Harms Modelling

  • 6. Harms considerations for C2PA stakeholders @@ -384,6 +384,9 @@

    6.1. General considerations for content creators

    -

    C2PA manifests may be used by content creators to provide cryptographically verifiable provenance information for various reasons, including, but not limited to, safeguarding authorship or providing additional signals of trust. +

    Content Credentials may be used by content creators to provide cryptographically verifiable provenance information for various reasons, including, but not limited to, safeguarding authorship or providing additional signals of trust. The harms, misuse, and abuse assessment laid out in this document have identified a list of potential harms, some of which may impact content creators. In order to avert and mitigate these potential harms, this assessment has informed and will continue to inform the development of the specifications. It is important to note, however, given the vast diversity of usages, stakeholders, and industries that the C2PA specifications could enable, that all identified potential harms may not be addressed at this level, but will need to be taken up by implementers in consideration of their specific circumstances, users and stakeholders.

    @@ -480,7 +483,7 @@

    -

    The decisions of implementors of the specifications may still hinder the use of C2PA-enabled technologies where they are needed the most. For example, there is the possibility that C2PA claim generators will not operate in pirated software. Additionally, some specification-compliant implementations may prefer to add restrictions to their use. For example, a tool may restrict its use to only newer devices or operating systems, despite the recommendations listed in the Guidance for implementers.

    +

    The decisions of implementors of the specifications may still hinder the use of Content Credentials where they are needed the most. For example, there is the possibility that C2PA claim generators will not operate in pirated software. Additionally, some specification-compliant implementations may prefer to add restrictions to their use. For example, a tool may restrict its use to only newer devices or operating systems, despite the recommendations listed in the Guidance for implementers.

    To address accessibility concerns related to the use of C2PA enabled tools and software, it is necessary to promote a diverse C2PA ecosystem that caters to all user groups throughout the world. To this end, the C2PA seeks to cooperate with implementers to work towards effective global accessibility for content creators and consumers.

    @@ -497,7 +500,7 @@

    User experience guidance has been published alongside the specs to offer a clear acknowledgement of creator consent before a C2PA implementation can begin accumulating data.

  • -

    Redacted (deleted) information from C2PA manifests may still be accessible: If a soft binding lookup is enabled or required by manifest stores, then previous versions of a manifest with sensitive information may be located.

    +

    Redacted (deleted) information from Content Credentials may still be accessible: If a soft binding lookup is enabled or required by manifest stores, then previous versions of a manifest with sensitive information may be located.

  • The use of C2PA-enabled tools and services in adverse legal or political situations may result in human rights violations: The C2PA specifications include features to protect the privacy of users, but this does not preclude the possibility of malicious actors, including potentially state actors, misusing or abusing the system.

    @@ -506,12 +509,12 @@

    -

    6.2. General considerations for content consumers (manifest consumers)

    +

    6.2. General considerations for content consumers (consumers of Content Credentials)

    The C2PA specifications do not provide value judgments about the truth or falsehood of digital assets. In other words, the presence of valid manifests does not mean that anything is ‘true’; validated manifests only establish whether the provenance information can be verified as associated with the underlying asset, correctly formed, and free from tampering.

    -

    As of version 1.1 of the specifications, the C2PA issues the following comments and considerations for content consumers:

    +

    As of version 1.4 of the specifications, the C2PA issues the following comments and considerations for content consumers:

    @@ -545,7 +548,7 @@

    Technical Accessibility considerations

    -

    As of version 1.1 of the specifications, the C2PA issues the following harms considerations for civic, community, and independent media that may be interested in 1. creating their own C2PA-enabled tool, 2. in becoming a signer, or 3. in simply using C2PA-enabled tools.

    +

    As of version 1.3 of the specifications, the C2PA issues the following harms considerations for civic, community, and independent media that may be interested in 1. creating their own C2PA-enabled tool, 2. in becoming a signer, or 3. in simply using C2PA-enabled tools.

    -

    Civic, community, and independent media may be interested in becoming signers in order to have their brand vouching for manifests tied to the digital assets they create and share. By becoming signers, civic, community, and independent media would also be able to determine what information (assertions) are included in the manifests generated.

    +

    Civic, community, and independent media may be interested in becoming signers in order to have their brand vouching for Content Credentials tied to the digital assets they create and share. By becoming signers, civic, community, and independent media would also be able to determine what information (assertions) are included in the Content Credentials generated.

    -

    There are two ways of becoming a signer: either by using credentials issued by a CA or by self-signing manifests. C2PA manifests currently makes use of X.509 certificates which allow for independent verification of your identity, thereby adding a layer of trust to the signed manifests. However, the X.509 certificates come at a cost that may not be accessible to all. For those that self-sign a provenance claim, they should note that these may be deemed to be less credible since the certificate is not independently verified.

    +

    There are two ways of becoming a signer: either by using credentials issued by a CA or by self-signing a C2PA manifest. C2PA manifests currently makes use of X.509 certificates which allow for independent verification of your identity, thereby adding a layer of trust to the signed manifests. However, the X.509 certificates come at a cost that may not be accessible to all. For those that self-sign a provenance claim, they should note that these may be deemed to be less credible since the certificate is not independently verified.

    -

    C2PA manifests may be used by the civic, community, and independent media to provide cryptographically verifiable provenance information for various reasons, including, but not limited to, safeguarding authorship or providing additional signals of trust.

    +

    Content Credentials may be used by the civic, community, and independent media to provide cryptographically verifiable provenance information for various reasons, including, but not limited to, safeguarding authorship or providing additional signals of trust.

  • -

    Redacted (deleted) information from C2PA manifests may still be accessible: If soft binding lookup is enabled or required by manifest stores, then previous versions of a manifest with sensitive information may be located.

    +

    Redacted (deleted) information from Content Credentials may still be accessible: If soft binding lookup is enabled or required by manifest stores, then previous versions of a manifest with sensitive information may be located.

  • The use of C2PA-enabled tools and services in adverse legal or political situations may result in human rights violations: The C2PA specifications include features to protect the privacy of users, but this does not preclude the possibility of malicious actors, including potentially state actors, to misuse or abuse the system.

    @@ -615,19 +618,19 @@

    6.4. General considerations for human rights defenders

    -

    Video captured by eyewitnesses and on-the-ground human rights activists can be instrumental in drawing attention to human rights violations, supporting calls for policy change, and pushing for accountability.

    +

    Video captured by eye witnesses and on-the-ground human rights activists can be instrumental in drawing attention to human rights violations, supporting calls for policy change, and pushing for accountability.

    The C2PA, its implementations, and the broader provenance and authenticity ecosystem could have both positive and negative effects on the way that visual or audiovisual evidence of human rights violations are captured and used.

    -

    On the one hand, digital assets embedded with manifests could help add a layer of trust so that evidence of human rights violations are not as easily dismissed or undermined. This could be more relevant now and in the future as technologies to create synthetic media are improved, further blurring the divide between what is real and fake. To name an example, C2PA manifests could be used to prevent the Liar’s Dividend, or the dismissal of real footage by suggesting that it is a deepfake or in other ways manipulated in order to avoid accountability.

    +

    On the one hand, digital assets embedded with Content Credentials could help add a layer of trust so that evidence of human rights violations are not as easily dismissed or undermined. This could be more relevant now and in the future as technologies to create synthetic media are improved, further blurring the divide between what is real and fake. To name an example, Content Credentials could be used to prevent the Liar’s Dividend, or the dismissal of real footage by suggesting that it is a deepfake or in other ways manipulated in order to avoid accountability.

    On the other hand, the mere existence of a provenance and authenticity ecosystem, bolstered by the C2PA specifications, could result in higher expectations of forensic proof of visual or audiovisual evidence of human rights violations. If this is the case, questions about accessibility and privacy arise, as well as about the requirements to determine authenticity in legal and social scenarios. To put it differently: Who will take the stand? If jurors and judges come to expect higher levels of admissibility of multimedia content, then witnesses could be asked to verify, corroborate, or authenticate multimedia evidence more frequently. Who will determine what is authentic in this case?

    -

    There are also questions around the legal use of C2PA manifests. Although the C2PA has not been designed to be used in legal procedures, it may still become an element of consideration in certain scenarios, both to add a layer of trust or to dismiss otherwise authentic content.

    +

    There are also questions around the legal use of Content Credentials. Although the C2PA has not been designed to be used in legal procedures, it may still become an element of consideration in certain scenarios, both to add a layer of trust or to dismiss otherwise authentic content.

    diff --git a/specifications/1.0/security/_attachments/Harms_Modelling.pdf b/specifications/1.0/security/_attachments/Harms_Modelling.pdf index 430e1fe..e64aa9d 100644 Binary files a/specifications/1.0/security/_attachments/Harms_Modelling.pdf and b/specifications/1.0/security/_attachments/Harms_Modelling.pdf differ diff --git a/specifications/1.0/security/_attachments/Security_Considerations.pdf b/specifications/1.0/security/_attachments/Security_Considerations.pdf index c0c0bbf..b312a82 100644 Binary files a/specifications/1.0/security/_attachments/Security_Considerations.pdf and b/specifications/1.0/security/_attachments/Security_Considerations.pdf differ