http://cybersecpolitics.blogspot.com/2016/03/a-technical-scheme-for-watermarking.html
It'd be great to hear from some non-US people in the industry as to whether they think this sort of thing is doable on their end. Likewise, it's not clear what parts of a technical proposal are most important? Are we most worried about non-state actors pretending to be State actors, or having a high confidence level in our result? In any case, hopefully ya'll enjoyed reading it! -dave _______________________________________________ Dailydave mailing list [email protected] https://lists.immunityinc.com/mailman/listinfo/dailydave
