Blocking people from taking pictures of me with smartphoneIs it possible to perform a MITM attack with a smartphone?Can a smartphone user prevent Google / Apple / Microsoft from finding out where s/he is? If yes, how?Why does my password appear in clear text with my smartphone mail IMAP application?Lock gmail access from a smartphone
How is "sein" conjugated in this sub-sentence?
How does turbine efficiency compare with internal combustion engines if all the turbine power is converted to mechanical energy?
Efficiently pathfinding many flocking enemies around obstacles
Vacuum collapse -- why do strong metals implode but glass doesn't?
Check in to 2 hotels at same location
Script that helps people make better choices
Defense against attacks using dictionaries
How to write triplets in 4/4 time without using a 3 on top of the notes all the time
What magic extends life or grants immortality?
Table caption in the middle of the table
Is there a known non-euclidean geometry where two concentric circles of different radii can intersect? (as in the novel "The Universe Between")
Why is 日本 read as "nihon" but not "nitsuhon"?
What does it mean to have a subnet mask /32?
Why don't electrons take the shorter path in coils
On the feasibility of space battleships
Concatenation of the result of a function with a mutable default argument in python
Configurable API Version for Anonymous Blocks?
Can pay be witheld for hours cleaning up after closing time?
Can you help me understand Modes from the aspect of chord changes?
Why don't we use Cavea-B
In what ways can a Non-paladin access Paladin spells?
Do AT motherboards (286, 386, 486) really need -5V (besides redirecting it to ISA connectors)?
Is refusing to concede in the face of an unstoppable Nexus combo punishable?
The teacher logged me in as administrator for doing a short task, is the whole system now compromised?
Blocking people from taking pictures of me with smartphone
Is it possible to perform a MITM attack with a smartphone?Can a smartphone user prevent Google / Apple / Microsoft from finding out where s/he is? If yes, how?Why does my password appear in clear text with my smartphone mail IMAP application?Lock gmail access from a smartphone
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty margin-bottom:0;
This question might be better suited for Skeptics, but I guess that those who can really answer this might hang around here.
In the second episode of the fourth season of the french spy series The Bureau (see around 0:36 in this clip), one hacker (A) demonstrated how when someone else (B) is taking a picture of him with a smartphone, the picture is not captured and instead a message "Do not do that motherf...!" is shown.
A claims that it works thanks to an app that he has on his own smartphone, interacting with B's smartphone to prevent it from taking pictures.
My question is if this really is doable. Of course if A previously hacked B's phone then there is nothing particularly special about it, but could this be achieved so that no random person showing app can take a picture of A with their smartphone?
smartphone
|
show 7 more comments
This question might be better suited for Skeptics, but I guess that those who can really answer this might hang around here.
In the second episode of the fourth season of the french spy series The Bureau (see around 0:36 in this clip), one hacker (A) demonstrated how when someone else (B) is taking a picture of him with a smartphone, the picture is not captured and instead a message "Do not do that motherf...!" is shown.
A claims that it works thanks to an app that he has on his own smartphone, interacting with B's smartphone to prevent it from taking pictures.
My question is if this really is doable. Of course if A previously hacked B's phone then there is nothing particularly special about it, but could this be achieved so that no random person showing app can take a picture of A with their smartphone?
smartphone
15
It probably would've been off-topic at Skeptics as it's not held to be a true claim in the original.
– WBT
Aug 9 at 19:26
24
I also heard you can cover your face with lemon juice to prevent security cameras from getting a picture of you. This guy tried it, and got caught. qz.com/986221/… You might now want to believe everything you see on TV/Internet.
– Steve Sether
Aug 9 at 20:54
8
Reminds me of this... youtube.com/watch?v=5rdXvtdSIF8
– barbecue
Aug 9 at 21:10
4
Use a tin-foil burka ...
– Hagen von Eitzen
Aug 10 at 14:48
9
Hang on, your smartphone uses 256-bit encryption. This is going to take a few seconds to hack. There, I'm in.
– Damon
Aug 10 at 19:06
|
show 7 more comments
This question might be better suited for Skeptics, but I guess that those who can really answer this might hang around here.
In the second episode of the fourth season of the french spy series The Bureau (see around 0:36 in this clip), one hacker (A) demonstrated how when someone else (B) is taking a picture of him with a smartphone, the picture is not captured and instead a message "Do not do that motherf...!" is shown.
A claims that it works thanks to an app that he has on his own smartphone, interacting with B's smartphone to prevent it from taking pictures.
My question is if this really is doable. Of course if A previously hacked B's phone then there is nothing particularly special about it, but could this be achieved so that no random person showing app can take a picture of A with their smartphone?
smartphone
This question might be better suited for Skeptics, but I guess that those who can really answer this might hang around here.
In the second episode of the fourth season of the french spy series The Bureau (see around 0:36 in this clip), one hacker (A) demonstrated how when someone else (B) is taking a picture of him with a smartphone, the picture is not captured and instead a message "Do not do that motherf...!" is shown.
A claims that it works thanks to an app that he has on his own smartphone, interacting with B's smartphone to prevent it from taking pictures.
My question is if this really is doable. Of course if A previously hacked B's phone then there is nothing particularly special about it, but could this be achieved so that no random person showing app can take a picture of A with their smartphone?
smartphone
smartphone
edited Aug 9 at 18:17
rrauenza
1031 bronze badge
1031 bronze badge
asked Aug 9 at 8:33
bangnabbangnab
3541 gold badge3 silver badges5 bronze badges
3541 gold badge3 silver badges5 bronze badges
15
It probably would've been off-topic at Skeptics as it's not held to be a true claim in the original.
– WBT
Aug 9 at 19:26
24
I also heard you can cover your face with lemon juice to prevent security cameras from getting a picture of you. This guy tried it, and got caught. qz.com/986221/… You might now want to believe everything you see on TV/Internet.
– Steve Sether
Aug 9 at 20:54
8
Reminds me of this... youtube.com/watch?v=5rdXvtdSIF8
– barbecue
Aug 9 at 21:10
4
Use a tin-foil burka ...
– Hagen von Eitzen
Aug 10 at 14:48
9
Hang on, your smartphone uses 256-bit encryption. This is going to take a few seconds to hack. There, I'm in.
– Damon
Aug 10 at 19:06
|
show 7 more comments
15
It probably would've been off-topic at Skeptics as it's not held to be a true claim in the original.
– WBT
Aug 9 at 19:26
24
I also heard you can cover your face with lemon juice to prevent security cameras from getting a picture of you. This guy tried it, and got caught. qz.com/986221/… You might now want to believe everything you see on TV/Internet.
– Steve Sether
Aug 9 at 20:54
8
Reminds me of this... youtube.com/watch?v=5rdXvtdSIF8
– barbecue
Aug 9 at 21:10
4
Use a tin-foil burka ...
– Hagen von Eitzen
Aug 10 at 14:48
9
Hang on, your smartphone uses 256-bit encryption. This is going to take a few seconds to hack. There, I'm in.
– Damon
Aug 10 at 19:06
15
15
It probably would've been off-topic at Skeptics as it's not held to be a true claim in the original.
– WBT
Aug 9 at 19:26
It probably would've been off-topic at Skeptics as it's not held to be a true claim in the original.
– WBT
Aug 9 at 19:26
24
24
I also heard you can cover your face with lemon juice to prevent security cameras from getting a picture of you. This guy tried it, and got caught. qz.com/986221/… You might now want to believe everything you see on TV/Internet.
– Steve Sether
Aug 9 at 20:54
I also heard you can cover your face with lemon juice to prevent security cameras from getting a picture of you. This guy tried it, and got caught. qz.com/986221/… You might now want to believe everything you see on TV/Internet.
– Steve Sether
Aug 9 at 20:54
8
8
Reminds me of this... youtube.com/watch?v=5rdXvtdSIF8
– barbecue
Aug 9 at 21:10
Reminds me of this... youtube.com/watch?v=5rdXvtdSIF8
– barbecue
Aug 9 at 21:10
4
4
Use a tin-foil burka ...
– Hagen von Eitzen
Aug 10 at 14:48
Use a tin-foil burka ...
– Hagen von Eitzen
Aug 10 at 14:48
9
9
Hang on, your smartphone uses 256-bit encryption. This is going to take a few seconds to hack. There, I'm in.
– Damon
Aug 10 at 19:06
Hang on, your smartphone uses 256-bit encryption. This is going to take a few seconds to hack. There, I'm in.
– Damon
Aug 10 at 19:06
|
show 7 more comments
9 Answers
9
active
oldest
votes
tl;dr
No, this completely falls within the realms of fiction!
The longer explanation
For something like this to work, Alice would need to find an exploit in the camera of Bob, which would then prevent Bob from taking a picture. The only ways of Alice to exploit Bob's camera is for her to send some kind of information to it.
Possible ways for her to do this would either be via what the camera "sees" or via some other channel (Bluetooth, Ad-Hoc Wi-Fi, etc.).
The first way is, to be frank, absolutely nuts. There are exploits related to images and specific image formats, but all those exploit the specifications of how image files are read, rather than the pixels on it.
As far as Bluetooth or Wi-Fi goes, this is a little bit more believable, but just barely above "Zoom and Enhance". If Alice could connect to Bob's phone via Bluetooth, there may be an exploit she could use that would disable the camera app.
However, if Bob used a dedicated camera instead of his phone, then Alice is out of luck and her picture will be taken.
How could I protect myself from having my picture taken?
There are, however, creative ways to hide yourself from cameras. After all, reality can be so much cooler than fiction if you get a bit creative.
Infrared LEDs emit infrared light. This light is not visible to our eyes, but to cameras. This difference is something that hackers can exploit.
By attaching many, high-powered infrared LEDs to your clothing in a way that they shine on your face (e.g. through LED strips on the inside of your hoodie, on your baseball cap, etc.), your face will receive much more light than the surroundings, causing your face to be extremely overexposed.
This will probably stop security cameras, since they will try to set their exposure in a way that most of the picture (i.e. your surroundings) are illuminated correctly.
Somebody taking pictures manually of you may be able to set the exposure correctly, showing your face, but making the rest of the picture very dark. With some clever image manipulation tricks, and multiple pictures taken at different exposure levels, you can be shown in your surroundings, even with such LEDs in place.
Cool, can I see how that looks like?
Here you can see a picture of glasses with just a few LEDs:
Attribution: Tokyo National Institute of Informatics
The two pictures on the top are with the LEDs turned off. This is how a person would see it. The green frame shows that a camera has detected a face.
The two pictures down below show the LEDs turned on. It's much harder to detect details of the person, but it's still doable, especially if you have some reference image. The camera, in this case, failed to identify a person.
With more and/or stronger LEDs, the effect will be much stronger.
Here is also a video, showing them in action with a typical webcam. Again, with some reference, a person is still identifiable.
What about the downsides to this?
Before you go online and order a 500 pack of infrared LED strips, there are some downsides to this technique.
- A battery or some other power source is required. This may be the least of your worries, since LEDs don't draw that much power, but running around with a 9v in your pocket may become annoying.
- You don't see if it's not working. Unless you regularly take selfies of your overexposed face, you don't know if your security system has failed.
- Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall. It does attract unwanted attention, is what I am trying to say.
- You depend on your clothing. Depending on where you go, it might not be feasible to wear clothing close to your face, such as a swimming pool. You may be able to wear a baseball cap, but then you run into the problem of a power source.
8
This reminds me of the movie Baby Driver where they used glasses like those.
– JoL
Aug 9 at 17:38
5
@chrylis, iPhones have IR filters, which make them useless for checking battery quality on old IR remote controls.
– Nathan Goings
Aug 9 at 19:04
45
"Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall."
– Coldblackice
Aug 10 at 11:55
5
Vaguely related: for flash photography, you don't need your own energy source, reflective materials can be useful enough ("paparazzi scarf"). And I wonder if smartphone cameras (need to) test for the EURion constellation these days.
– Ulrich Schwarz
Aug 10 at 16:13
3
Your best bet targeting image encoders would be to shine a QR code with malicious payload onto your face. The eye won't see it, but a smartphone will pick it up, try to decode it, and run your code. One QR code for Android phones and one for Apples should do the trick beautifully. Gives an entirely new meaning to the phrase "turn the other cheek" because that's where the two QR codes are.
– John Dvorak
Aug 10 at 19:50
|
show 19 more comments
This is not doable.
Unless hacked, your smartphone doesn't communicate with other smartphones around it. It doesn't even know if someone is taking pictures. There's no way it could possibly block someone taking a photo of you.
In the clip you've linked, A explains that he can do "whatever he wants", like "altering the Internet connection". He's implicitly saying that he hacked her phone, that's how he got full control of it.
40
@bangnab You can't just "hack" things. This is one of the biggest myths Hollywood has propagated.
– MechMK1
Aug 9 at 9:14
3
What I meant is that there could be exploits that are only known to intelligence agencies allowing one to break into others phones via wifi or bluetooth and compromising the phone's camera.
– bangnab
Aug 9 at 9:19
6
@bangnab: There could be, and there could also be an invisibility cloak helping you to avoid pictures. :) As far as we know, this is just pure fiction.
– Benoit Esnard
Aug 9 at 9:22
8
@Henrik This statement holds true to anything. "There might be knowledge that isn't public" is quite a generic statement.
– MechMK1
Aug 9 at 11:57
6
@MechMK1 I believe that's Henrik's entire point...
– only_pro
Aug 9 at 20:11
|
show 8 more comments
Here is a patent for technology that will tell smart phone A not to take a picture of asset B.
https://www.theatlantic.com/technology/archive/2016/07/what-if-cameras-stopped-telling-the-truth/491150/
Now if all the smart phone vendors implemented this, similar to how the consumer grade DVD player vendors all agree on DVD copying then eventually you'd get the situation where most phones don't take the image. Not perfect of course.
7
Literally all I needed was a filter in front of the lens to block IR light and I would be able to circumvent this. Doesn't surprise me that a patent from 2011 didn't catch on.
– MechMK1
Aug 9 at 9:38
2
@MechMK1 LOL that's right. Besides who wants to buy a smartphone that won't take pictures ...
– Unicorn Tears
Aug 9 at 10:57
12
DVD player vendors didn't voluntarily agree to restrict DVD copying. They all want to let consumers do that (because it would make their product more valuable to consumers, for no additional cost to them), but they're not allowed, because the DVD rights owner won't let them. There's no equivalent intellectual property rights to make cameras work, so there's no reason any vendor would intentionally make their own camera worse.
– Joseph Sible
Aug 9 at 15:10
add a comment |
If A has knowledge of an unpatched vulnerability in B's phone, then it's possible that A's device could wirelessly upload an exploit to B's phone and interfere with the photo software's operation to prevent the photo being saved. If this is done passively, then A needs exploits for any phone that they could encounter. It also wouldn't work on older digital cameras that don't have wireless capability, but most people don't carry those anymore. The ability could only be available to a select few, since software and/or hardware manufacturers would patch the vulnerability if they got their hands on the exploit.
It's possible than an exploit like this exist, but it'd either be in the hands of a government agency using it for surveillance or someone who would sell it.
From the video clip, it doesn't look like there is physical interference with the camera, since you can see the target's face on the screen before the photo is taken. MechMK1 gave some good examples of physical interference methods, but there is also the case of a billionaire's yacht blocking paparazzi cameras by shooting lasers at the sensors and this purse that reacts to camera flashes with its own
add a comment |
I think there might be scenarios in which this could work. Imagine a person wearing a T-shirt with a QR code. Person B tries to shoot a photo with his smartphone. The smartphone recognises the QR code which
automatically opens a web browser showing a webpage stating "Stop
this"or
generates a buffer overflow due to buggy implementation of the
QR code interpreter.
3
I don't know of any stock camera apps that automatically resolve QR codes.
– Michael Frank
Aug 12 at 0:01
2
The default camera app on the iphone will detect qr-codes
– Robert
Aug 12 at 10:16
@MichaelFrank The default camera app on the Xiaomi Pocophone F1 detects QR codes.
– TheGreatCabbage
Aug 12 at 13:54
add a comment |
Part of this is theoretically possible, but the scenario as described is a TV fantasy.
There is active research into detecting lenses pointed at a target, but they are aimed at sniper rifles, not cameras, e.g. this patent. There are also multiple ways to detect hidden cameras, aimed at surveillance. And, of course, there's even an app for that.
These technologies could be combined into a detector that notices when someone points a camera at you, including that from a smartphone. Leaving questions of reliability and false positives aside, it could be combined with a technology like the anti-face-detection LEDs MechMK1 mentions to form a kind of selective camera camouflage.
But how would you get the other person's smartphone to show a message, or a picture entirely different from the one they were trying to take? The first case would require you to hack their smartphone, over the air, in real time. If that were feasible, it would already happen, and for more nefarious purposes. For a spy movie, that's the kind of rocket-shooting, underwater-driving car that we accept in such movies, but it's not real.
To show a completely different picture (the 2nd example in the clip) simply defies the laws of physics. You would have to project light into the camera aimed at you, but to fill the entire picture and not the tiny dot of your projector lens would require the light beams to bend in ways that light simply doesn't bend like.
Having detected a camera lens pointed at the victim, the countermeasure projects the desired image (message) directly into it, e.g. with a small scanning laser, completely overexposing and blowing out the face of the victim. Could be accompanied by a notification, or just make it powerful enough to ignite the attacker's phone battery, which will be notification enough.
– qris
Aug 12 at 13:03
1
@qris: You seem to miss the basic function of a lens. The laser emitting from one point will be focused by the lens on one pixel of the smartphone's camera. This is true regardless of where exactly the laser beam hits the lens, so a "scanning laser" won't help.
– MSalters
Aug 12 at 13:40
add a comment |
Yes, it is doable, but it would be a voluntary feature of the camera app of the person that takes the photo. I do not think it is implemented in any common camera app, but there are implementations in many photocopiers, that prevent you from copying things with a certain dot pattern on it.
The EURion constellation is a special pattern, that can be recognized by these devices and stops people from copying banknotes. In addition to photocopiers, some software like Adobe Photoshop implements this as well.
People already experimented with printing EURion on t-shirts and other clothing. I do not think they were successful.
Other experiments involve adversarial pattern for image recognition neural networks, that prevent face detection or lead the camera not to focus on the face, when it is in auto-focus mode. Most of such patterns are rather obvious make-up, that you would not wear every day. Another technical device that uses infrared LEDs is mentioned in the post of MechMK1.
1
The reason why you can't print an EURion pattern on a shirt and have it block the camera is because cameras are generally not used to make copies of bank notes, since the perspective would distort the image. Furthermore, shirts are often bent and wavy when people are sitting or walking, so parts of the pattern may be obscured.
– MechMK1
Aug 12 at 11:38
add a comment |
If the original question is limited to "hacking" just Person B's phone, then it's quite doable with only minor "suspension of disbelief."
First, Person A obtains B-phone's SIM id. Then Person A's phone checks the location of PhoneB, and if it's within, say, 10 meters, PhoneA checks an outgoing message (here's where some hack software would have to have been loaded) from PhoneB indicating a camera is activated. Now Person A is at least warned.
FWIW, it is completely reasonable to posit that NSA-level tools can force OTA installs onto PersonB's phone without any notifications being made. And for that matter, given another few years' worth of software development and smartphone processor capability, why not claim that such a software install includes facial recognition tools that could identify PersonA and then intercept the current camera image(s).
add a comment |
TL;DR: i disagree with most answers here, Apple and Google could probably do it.
Apple could implement it for all iPhones, i guess Google could do the same for all androids phones, for all internet-connected phones under their control with GPS enabled. (system that asks an internet server if it's ok to use the camera in that GPS position before allowing a camera app, or any app, to take control of the camera hardware.. sure one could argue that "all you have to do is to disable internet and GPS", but they could also make those mandatory to take a picture, at least for non-rooted (or in iPhone-terminology, non-jailbroken) phones)
1
It’s an interesting idea, but it’s not currently possible.
– securityOrange
Aug 11 at 22:01
@securityOrange what is not currently possible? iPhones have everything required to implement it
– user1067003
Aug 11 at 22:14
Be that as it may, it’s not something that has been implemented. So again, it’s a really sweet idea and I personally dig it, but for users it’s not accessible (currently).
– securityOrange
Aug 11 at 22:25
@securityOrange question is "is it doable", not "is it implemented", and yeah, it's theoretically doable for Tim Cook. (and maybe POTUS could pull it off as a national security concern or whatever)
– user1067003
Aug 12 at 7:45
The question is not whether it is possible for a phone developer to create the functionality (of course they can), but whether a user could.
– schroeder♦
Aug 12 at 14:16
|
show 2 more comments
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "162"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f215010%2fblocking-people-from-taking-pictures-of-me-with-smartphone%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
9 Answers
9
active
oldest
votes
9 Answers
9
active
oldest
votes
active
oldest
votes
active
oldest
votes
tl;dr
No, this completely falls within the realms of fiction!
The longer explanation
For something like this to work, Alice would need to find an exploit in the camera of Bob, which would then prevent Bob from taking a picture. The only ways of Alice to exploit Bob's camera is for her to send some kind of information to it.
Possible ways for her to do this would either be via what the camera "sees" or via some other channel (Bluetooth, Ad-Hoc Wi-Fi, etc.).
The first way is, to be frank, absolutely nuts. There are exploits related to images and specific image formats, but all those exploit the specifications of how image files are read, rather than the pixels on it.
As far as Bluetooth or Wi-Fi goes, this is a little bit more believable, but just barely above "Zoom and Enhance". If Alice could connect to Bob's phone via Bluetooth, there may be an exploit she could use that would disable the camera app.
However, if Bob used a dedicated camera instead of his phone, then Alice is out of luck and her picture will be taken.
How could I protect myself from having my picture taken?
There are, however, creative ways to hide yourself from cameras. After all, reality can be so much cooler than fiction if you get a bit creative.
Infrared LEDs emit infrared light. This light is not visible to our eyes, but to cameras. This difference is something that hackers can exploit.
By attaching many, high-powered infrared LEDs to your clothing in a way that they shine on your face (e.g. through LED strips on the inside of your hoodie, on your baseball cap, etc.), your face will receive much more light than the surroundings, causing your face to be extremely overexposed.
This will probably stop security cameras, since they will try to set their exposure in a way that most of the picture (i.e. your surroundings) are illuminated correctly.
Somebody taking pictures manually of you may be able to set the exposure correctly, showing your face, but making the rest of the picture very dark. With some clever image manipulation tricks, and multiple pictures taken at different exposure levels, you can be shown in your surroundings, even with such LEDs in place.
Cool, can I see how that looks like?
Here you can see a picture of glasses with just a few LEDs:
Attribution: Tokyo National Institute of Informatics
The two pictures on the top are with the LEDs turned off. This is how a person would see it. The green frame shows that a camera has detected a face.
The two pictures down below show the LEDs turned on. It's much harder to detect details of the person, but it's still doable, especially if you have some reference image. The camera, in this case, failed to identify a person.
With more and/or stronger LEDs, the effect will be much stronger.
Here is also a video, showing them in action with a typical webcam. Again, with some reference, a person is still identifiable.
What about the downsides to this?
Before you go online and order a 500 pack of infrared LED strips, there are some downsides to this technique.
- A battery or some other power source is required. This may be the least of your worries, since LEDs don't draw that much power, but running around with a 9v in your pocket may become annoying.
- You don't see if it's not working. Unless you regularly take selfies of your overexposed face, you don't know if your security system has failed.
- Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall. It does attract unwanted attention, is what I am trying to say.
- You depend on your clothing. Depending on where you go, it might not be feasible to wear clothing close to your face, such as a swimming pool. You may be able to wear a baseball cap, but then you run into the problem of a power source.
8
This reminds me of the movie Baby Driver where they used glasses like those.
– JoL
Aug 9 at 17:38
5
@chrylis, iPhones have IR filters, which make them useless for checking battery quality on old IR remote controls.
– Nathan Goings
Aug 9 at 19:04
45
"Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall."
– Coldblackice
Aug 10 at 11:55
5
Vaguely related: for flash photography, you don't need your own energy source, reflective materials can be useful enough ("paparazzi scarf"). And I wonder if smartphone cameras (need to) test for the EURion constellation these days.
– Ulrich Schwarz
Aug 10 at 16:13
3
Your best bet targeting image encoders would be to shine a QR code with malicious payload onto your face. The eye won't see it, but a smartphone will pick it up, try to decode it, and run your code. One QR code for Android phones and one for Apples should do the trick beautifully. Gives an entirely new meaning to the phrase "turn the other cheek" because that's where the two QR codes are.
– John Dvorak
Aug 10 at 19:50
|
show 19 more comments
tl;dr
No, this completely falls within the realms of fiction!
The longer explanation
For something like this to work, Alice would need to find an exploit in the camera of Bob, which would then prevent Bob from taking a picture. The only ways of Alice to exploit Bob's camera is for her to send some kind of information to it.
Possible ways for her to do this would either be via what the camera "sees" or via some other channel (Bluetooth, Ad-Hoc Wi-Fi, etc.).
The first way is, to be frank, absolutely nuts. There are exploits related to images and specific image formats, but all those exploit the specifications of how image files are read, rather than the pixels on it.
As far as Bluetooth or Wi-Fi goes, this is a little bit more believable, but just barely above "Zoom and Enhance". If Alice could connect to Bob's phone via Bluetooth, there may be an exploit she could use that would disable the camera app.
However, if Bob used a dedicated camera instead of his phone, then Alice is out of luck and her picture will be taken.
How could I protect myself from having my picture taken?
There are, however, creative ways to hide yourself from cameras. After all, reality can be so much cooler than fiction if you get a bit creative.
Infrared LEDs emit infrared light. This light is not visible to our eyes, but to cameras. This difference is something that hackers can exploit.
By attaching many, high-powered infrared LEDs to your clothing in a way that they shine on your face (e.g. through LED strips on the inside of your hoodie, on your baseball cap, etc.), your face will receive much more light than the surroundings, causing your face to be extremely overexposed.
This will probably stop security cameras, since they will try to set their exposure in a way that most of the picture (i.e. your surroundings) are illuminated correctly.
Somebody taking pictures manually of you may be able to set the exposure correctly, showing your face, but making the rest of the picture very dark. With some clever image manipulation tricks, and multiple pictures taken at different exposure levels, you can be shown in your surroundings, even with such LEDs in place.
Cool, can I see how that looks like?
Here you can see a picture of glasses with just a few LEDs:
Attribution: Tokyo National Institute of Informatics
The two pictures on the top are with the LEDs turned off. This is how a person would see it. The green frame shows that a camera has detected a face.
The two pictures down below show the LEDs turned on. It's much harder to detect details of the person, but it's still doable, especially if you have some reference image. The camera, in this case, failed to identify a person.
With more and/or stronger LEDs, the effect will be much stronger.
Here is also a video, showing them in action with a typical webcam. Again, with some reference, a person is still identifiable.
What about the downsides to this?
Before you go online and order a 500 pack of infrared LED strips, there are some downsides to this technique.
- A battery or some other power source is required. This may be the least of your worries, since LEDs don't draw that much power, but running around with a 9v in your pocket may become annoying.
- You don't see if it's not working. Unless you regularly take selfies of your overexposed face, you don't know if your security system has failed.
- Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall. It does attract unwanted attention, is what I am trying to say.
- You depend on your clothing. Depending on where you go, it might not be feasible to wear clothing close to your face, such as a swimming pool. You may be able to wear a baseball cap, but then you run into the problem of a power source.
8
This reminds me of the movie Baby Driver where they used glasses like those.
– JoL
Aug 9 at 17:38
5
@chrylis, iPhones have IR filters, which make them useless for checking battery quality on old IR remote controls.
– Nathan Goings
Aug 9 at 19:04
45
"Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall."
– Coldblackice
Aug 10 at 11:55
5
Vaguely related: for flash photography, you don't need your own energy source, reflective materials can be useful enough ("paparazzi scarf"). And I wonder if smartphone cameras (need to) test for the EURion constellation these days.
– Ulrich Schwarz
Aug 10 at 16:13
3
Your best bet targeting image encoders would be to shine a QR code with malicious payload onto your face. The eye won't see it, but a smartphone will pick it up, try to decode it, and run your code. One QR code for Android phones and one for Apples should do the trick beautifully. Gives an entirely new meaning to the phrase "turn the other cheek" because that's where the two QR codes are.
– John Dvorak
Aug 10 at 19:50
|
show 19 more comments
tl;dr
No, this completely falls within the realms of fiction!
The longer explanation
For something like this to work, Alice would need to find an exploit in the camera of Bob, which would then prevent Bob from taking a picture. The only ways of Alice to exploit Bob's camera is for her to send some kind of information to it.
Possible ways for her to do this would either be via what the camera "sees" or via some other channel (Bluetooth, Ad-Hoc Wi-Fi, etc.).
The first way is, to be frank, absolutely nuts. There are exploits related to images and specific image formats, but all those exploit the specifications of how image files are read, rather than the pixels on it.
As far as Bluetooth or Wi-Fi goes, this is a little bit more believable, but just barely above "Zoom and Enhance". If Alice could connect to Bob's phone via Bluetooth, there may be an exploit she could use that would disable the camera app.
However, if Bob used a dedicated camera instead of his phone, then Alice is out of luck and her picture will be taken.
How could I protect myself from having my picture taken?
There are, however, creative ways to hide yourself from cameras. After all, reality can be so much cooler than fiction if you get a bit creative.
Infrared LEDs emit infrared light. This light is not visible to our eyes, but to cameras. This difference is something that hackers can exploit.
By attaching many, high-powered infrared LEDs to your clothing in a way that they shine on your face (e.g. through LED strips on the inside of your hoodie, on your baseball cap, etc.), your face will receive much more light than the surroundings, causing your face to be extremely overexposed.
This will probably stop security cameras, since they will try to set their exposure in a way that most of the picture (i.e. your surroundings) are illuminated correctly.
Somebody taking pictures manually of you may be able to set the exposure correctly, showing your face, but making the rest of the picture very dark. With some clever image manipulation tricks, and multiple pictures taken at different exposure levels, you can be shown in your surroundings, even with such LEDs in place.
Cool, can I see how that looks like?
Here you can see a picture of glasses with just a few LEDs:
Attribution: Tokyo National Institute of Informatics
The two pictures on the top are with the LEDs turned off. This is how a person would see it. The green frame shows that a camera has detected a face.
The two pictures down below show the LEDs turned on. It's much harder to detect details of the person, but it's still doable, especially if you have some reference image. The camera, in this case, failed to identify a person.
With more and/or stronger LEDs, the effect will be much stronger.
Here is also a video, showing them in action with a typical webcam. Again, with some reference, a person is still identifiable.
What about the downsides to this?
Before you go online and order a 500 pack of infrared LED strips, there are some downsides to this technique.
- A battery or some other power source is required. This may be the least of your worries, since LEDs don't draw that much power, but running around with a 9v in your pocket may become annoying.
- You don't see if it's not working. Unless you regularly take selfies of your overexposed face, you don't know if your security system has failed.
- Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall. It does attract unwanted attention, is what I am trying to say.
- You depend on your clothing. Depending on where you go, it might not be feasible to wear clothing close to your face, such as a swimming pool. You may be able to wear a baseball cap, but then you run into the problem of a power source.
tl;dr
No, this completely falls within the realms of fiction!
The longer explanation
For something like this to work, Alice would need to find an exploit in the camera of Bob, which would then prevent Bob from taking a picture. The only ways of Alice to exploit Bob's camera is for her to send some kind of information to it.
Possible ways for her to do this would either be via what the camera "sees" or via some other channel (Bluetooth, Ad-Hoc Wi-Fi, etc.).
The first way is, to be frank, absolutely nuts. There are exploits related to images and specific image formats, but all those exploit the specifications of how image files are read, rather than the pixels on it.
As far as Bluetooth or Wi-Fi goes, this is a little bit more believable, but just barely above "Zoom and Enhance". If Alice could connect to Bob's phone via Bluetooth, there may be an exploit she could use that would disable the camera app.
However, if Bob used a dedicated camera instead of his phone, then Alice is out of luck and her picture will be taken.
How could I protect myself from having my picture taken?
There are, however, creative ways to hide yourself from cameras. After all, reality can be so much cooler than fiction if you get a bit creative.
Infrared LEDs emit infrared light. This light is not visible to our eyes, but to cameras. This difference is something that hackers can exploit.
By attaching many, high-powered infrared LEDs to your clothing in a way that they shine on your face (e.g. through LED strips on the inside of your hoodie, on your baseball cap, etc.), your face will receive much more light than the surroundings, causing your face to be extremely overexposed.
This will probably stop security cameras, since they will try to set their exposure in a way that most of the picture (i.e. your surroundings) are illuminated correctly.
Somebody taking pictures manually of you may be able to set the exposure correctly, showing your face, but making the rest of the picture very dark. With some clever image manipulation tricks, and multiple pictures taken at different exposure levels, you can be shown in your surroundings, even with such LEDs in place.
Cool, can I see how that looks like?
Here you can see a picture of glasses with just a few LEDs:
Attribution: Tokyo National Institute of Informatics
The two pictures on the top are with the LEDs turned off. This is how a person would see it. The green frame shows that a camera has detected a face.
The two pictures down below show the LEDs turned on. It's much harder to detect details of the person, but it's still doable, especially if you have some reference image. The camera, in this case, failed to identify a person.
With more and/or stronger LEDs, the effect will be much stronger.
Here is also a video, showing them in action with a typical webcam. Again, with some reference, a person is still identifiable.
What about the downsides to this?
Before you go online and order a 500 pack of infrared LED strips, there are some downsides to this technique.
- A battery or some other power source is required. This may be the least of your worries, since LEDs don't draw that much power, but running around with a 9v in your pocket may become annoying.
- You don't see if it's not working. Unless you regularly take selfies of your overexposed face, you don't know if your security system has failed.
- Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall. It does attract unwanted attention, is what I am trying to say.
- You depend on your clothing. Depending on where you go, it might not be feasible to wear clothing close to your face, such as a swimming pool. You may be able to wear a baseball cap, but then you run into the problem of a power source.
edited Aug 9 at 9:23
answered Aug 9 at 9:13
MechMK1MechMK1
6,6533 gold badges25 silver badges46 bronze badges
6,6533 gold badges25 silver badges46 bronze badges
8
This reminds me of the movie Baby Driver where they used glasses like those.
– JoL
Aug 9 at 17:38
5
@chrylis, iPhones have IR filters, which make them useless for checking battery quality on old IR remote controls.
– Nathan Goings
Aug 9 at 19:04
45
"Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall."
– Coldblackice
Aug 10 at 11:55
5
Vaguely related: for flash photography, you don't need your own energy source, reflective materials can be useful enough ("paparazzi scarf"). And I wonder if smartphone cameras (need to) test for the EURion constellation these days.
– Ulrich Schwarz
Aug 10 at 16:13
3
Your best bet targeting image encoders would be to shine a QR code with malicious payload onto your face. The eye won't see it, but a smartphone will pick it up, try to decode it, and run your code. One QR code for Android phones and one for Apples should do the trick beautifully. Gives an entirely new meaning to the phrase "turn the other cheek" because that's where the two QR codes are.
– John Dvorak
Aug 10 at 19:50
|
show 19 more comments
8
This reminds me of the movie Baby Driver where they used glasses like those.
– JoL
Aug 9 at 17:38
5
@chrylis, iPhones have IR filters, which make them useless for checking battery quality on old IR remote controls.
– Nathan Goings
Aug 9 at 19:04
45
"Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall."
– Coldblackice
Aug 10 at 11:55
5
Vaguely related: for flash photography, you don't need your own energy source, reflective materials can be useful enough ("paparazzi scarf"). And I wonder if smartphone cameras (need to) test for the EURion constellation these days.
– Ulrich Schwarz
Aug 10 at 16:13
3
Your best bet targeting image encoders would be to shine a QR code with malicious payload onto your face. The eye won't see it, but a smartphone will pick it up, try to decode it, and run your code. One QR code for Android phones and one for Apples should do the trick beautifully. Gives an entirely new meaning to the phrase "turn the other cheek" because that's where the two QR codes are.
– John Dvorak
Aug 10 at 19:50
8
8
This reminds me of the movie Baby Driver where they used glasses like those.
– JoL
Aug 9 at 17:38
This reminds me of the movie Baby Driver where they used glasses like those.
– JoL
Aug 9 at 17:38
5
5
@chrylis, iPhones have IR filters, which make them useless for checking battery quality on old IR remote controls.
– Nathan Goings
Aug 9 at 19:04
@chrylis, iPhones have IR filters, which make them useless for checking battery quality on old IR remote controls.
– Nathan Goings
Aug 9 at 19:04
45
45
"Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall."
– Coldblackice
Aug 10 at 11:55
"Since you quite literally look like a shining ball of light on pictures, people reviewing security camera footage will probably start investigating why Jesus is casually walking through the mall."
– Coldblackice
Aug 10 at 11:55
5
5
Vaguely related: for flash photography, you don't need your own energy source, reflective materials can be useful enough ("paparazzi scarf"). And I wonder if smartphone cameras (need to) test for the EURion constellation these days.
– Ulrich Schwarz
Aug 10 at 16:13
Vaguely related: for flash photography, you don't need your own energy source, reflective materials can be useful enough ("paparazzi scarf"). And I wonder if smartphone cameras (need to) test for the EURion constellation these days.
– Ulrich Schwarz
Aug 10 at 16:13
3
3
Your best bet targeting image encoders would be to shine a QR code with malicious payload onto your face. The eye won't see it, but a smartphone will pick it up, try to decode it, and run your code. One QR code for Android phones and one for Apples should do the trick beautifully. Gives an entirely new meaning to the phrase "turn the other cheek" because that's where the two QR codes are.
– John Dvorak
Aug 10 at 19:50
Your best bet targeting image encoders would be to shine a QR code with malicious payload onto your face. The eye won't see it, but a smartphone will pick it up, try to decode it, and run your code. One QR code for Android phones and one for Apples should do the trick beautifully. Gives an entirely new meaning to the phrase "turn the other cheek" because that's where the two QR codes are.
– John Dvorak
Aug 10 at 19:50
|
show 19 more comments
This is not doable.
Unless hacked, your smartphone doesn't communicate with other smartphones around it. It doesn't even know if someone is taking pictures. There's no way it could possibly block someone taking a photo of you.
In the clip you've linked, A explains that he can do "whatever he wants", like "altering the Internet connection". He's implicitly saying that he hacked her phone, that's how he got full control of it.
40
@bangnab You can't just "hack" things. This is one of the biggest myths Hollywood has propagated.
– MechMK1
Aug 9 at 9:14
3
What I meant is that there could be exploits that are only known to intelligence agencies allowing one to break into others phones via wifi or bluetooth and compromising the phone's camera.
– bangnab
Aug 9 at 9:19
6
@bangnab: There could be, and there could also be an invisibility cloak helping you to avoid pictures. :) As far as we know, this is just pure fiction.
– Benoit Esnard
Aug 9 at 9:22
8
@Henrik This statement holds true to anything. "There might be knowledge that isn't public" is quite a generic statement.
– MechMK1
Aug 9 at 11:57
6
@MechMK1 I believe that's Henrik's entire point...
– only_pro
Aug 9 at 20:11
|
show 8 more comments
This is not doable.
Unless hacked, your smartphone doesn't communicate with other smartphones around it. It doesn't even know if someone is taking pictures. There's no way it could possibly block someone taking a photo of you.
In the clip you've linked, A explains that he can do "whatever he wants", like "altering the Internet connection". He's implicitly saying that he hacked her phone, that's how he got full control of it.
40
@bangnab You can't just "hack" things. This is one of the biggest myths Hollywood has propagated.
– MechMK1
Aug 9 at 9:14
3
What I meant is that there could be exploits that are only known to intelligence agencies allowing one to break into others phones via wifi or bluetooth and compromising the phone's camera.
– bangnab
Aug 9 at 9:19
6
@bangnab: There could be, and there could also be an invisibility cloak helping you to avoid pictures. :) As far as we know, this is just pure fiction.
– Benoit Esnard
Aug 9 at 9:22
8
@Henrik This statement holds true to anything. "There might be knowledge that isn't public" is quite a generic statement.
– MechMK1
Aug 9 at 11:57
6
@MechMK1 I believe that's Henrik's entire point...
– only_pro
Aug 9 at 20:11
|
show 8 more comments
This is not doable.
Unless hacked, your smartphone doesn't communicate with other smartphones around it. It doesn't even know if someone is taking pictures. There's no way it could possibly block someone taking a photo of you.
In the clip you've linked, A explains that he can do "whatever he wants", like "altering the Internet connection". He's implicitly saying that he hacked her phone, that's how he got full control of it.
This is not doable.
Unless hacked, your smartphone doesn't communicate with other smartphones around it. It doesn't even know if someone is taking pictures. There's no way it could possibly block someone taking a photo of you.
In the clip you've linked, A explains that he can do "whatever he wants", like "altering the Internet connection". He's implicitly saying that he hacked her phone, that's how he got full control of it.
answered Aug 9 at 9:09
Benoit EsnardBenoit Esnard
11.2k7 gold badges56 silver badges58 bronze badges
11.2k7 gold badges56 silver badges58 bronze badges
40
@bangnab You can't just "hack" things. This is one of the biggest myths Hollywood has propagated.
– MechMK1
Aug 9 at 9:14
3
What I meant is that there could be exploits that are only known to intelligence agencies allowing one to break into others phones via wifi or bluetooth and compromising the phone's camera.
– bangnab
Aug 9 at 9:19
6
@bangnab: There could be, and there could also be an invisibility cloak helping you to avoid pictures. :) As far as we know, this is just pure fiction.
– Benoit Esnard
Aug 9 at 9:22
8
@Henrik This statement holds true to anything. "There might be knowledge that isn't public" is quite a generic statement.
– MechMK1
Aug 9 at 11:57
6
@MechMK1 I believe that's Henrik's entire point...
– only_pro
Aug 9 at 20:11
|
show 8 more comments
40
@bangnab You can't just "hack" things. This is one of the biggest myths Hollywood has propagated.
– MechMK1
Aug 9 at 9:14
3
What I meant is that there could be exploits that are only known to intelligence agencies allowing one to break into others phones via wifi or bluetooth and compromising the phone's camera.
– bangnab
Aug 9 at 9:19
6
@bangnab: There could be, and there could also be an invisibility cloak helping you to avoid pictures. :) As far as we know, this is just pure fiction.
– Benoit Esnard
Aug 9 at 9:22
8
@Henrik This statement holds true to anything. "There might be knowledge that isn't public" is quite a generic statement.
– MechMK1
Aug 9 at 11:57
6
@MechMK1 I believe that's Henrik's entire point...
– only_pro
Aug 9 at 20:11
40
40
@bangnab You can't just "hack" things. This is one of the biggest myths Hollywood has propagated.
– MechMK1
Aug 9 at 9:14
@bangnab You can't just "hack" things. This is one of the biggest myths Hollywood has propagated.
– MechMK1
Aug 9 at 9:14
3
3
What I meant is that there could be exploits that are only known to intelligence agencies allowing one to break into others phones via wifi or bluetooth and compromising the phone's camera.
– bangnab
Aug 9 at 9:19
What I meant is that there could be exploits that are only known to intelligence agencies allowing one to break into others phones via wifi or bluetooth and compromising the phone's camera.
– bangnab
Aug 9 at 9:19
6
6
@bangnab: There could be, and there could also be an invisibility cloak helping you to avoid pictures. :) As far as we know, this is just pure fiction.
– Benoit Esnard
Aug 9 at 9:22
@bangnab: There could be, and there could also be an invisibility cloak helping you to avoid pictures. :) As far as we know, this is just pure fiction.
– Benoit Esnard
Aug 9 at 9:22
8
8
@Henrik This statement holds true to anything. "There might be knowledge that isn't public" is quite a generic statement.
– MechMK1
Aug 9 at 11:57
@Henrik This statement holds true to anything. "There might be knowledge that isn't public" is quite a generic statement.
– MechMK1
Aug 9 at 11:57
6
6
@MechMK1 I believe that's Henrik's entire point...
– only_pro
Aug 9 at 20:11
@MechMK1 I believe that's Henrik's entire point...
– only_pro
Aug 9 at 20:11
|
show 8 more comments
Here is a patent for technology that will tell smart phone A not to take a picture of asset B.
https://www.theatlantic.com/technology/archive/2016/07/what-if-cameras-stopped-telling-the-truth/491150/
Now if all the smart phone vendors implemented this, similar to how the consumer grade DVD player vendors all agree on DVD copying then eventually you'd get the situation where most phones don't take the image. Not perfect of course.
7
Literally all I needed was a filter in front of the lens to block IR light and I would be able to circumvent this. Doesn't surprise me that a patent from 2011 didn't catch on.
– MechMK1
Aug 9 at 9:38
2
@MechMK1 LOL that's right. Besides who wants to buy a smartphone that won't take pictures ...
– Unicorn Tears
Aug 9 at 10:57
12
DVD player vendors didn't voluntarily agree to restrict DVD copying. They all want to let consumers do that (because it would make their product more valuable to consumers, for no additional cost to them), but they're not allowed, because the DVD rights owner won't let them. There's no equivalent intellectual property rights to make cameras work, so there's no reason any vendor would intentionally make their own camera worse.
– Joseph Sible
Aug 9 at 15:10
add a comment |
Here is a patent for technology that will tell smart phone A not to take a picture of asset B.
https://www.theatlantic.com/technology/archive/2016/07/what-if-cameras-stopped-telling-the-truth/491150/
Now if all the smart phone vendors implemented this, similar to how the consumer grade DVD player vendors all agree on DVD copying then eventually you'd get the situation where most phones don't take the image. Not perfect of course.
7
Literally all I needed was a filter in front of the lens to block IR light and I would be able to circumvent this. Doesn't surprise me that a patent from 2011 didn't catch on.
– MechMK1
Aug 9 at 9:38
2
@MechMK1 LOL that's right. Besides who wants to buy a smartphone that won't take pictures ...
– Unicorn Tears
Aug 9 at 10:57
12
DVD player vendors didn't voluntarily agree to restrict DVD copying. They all want to let consumers do that (because it would make their product more valuable to consumers, for no additional cost to them), but they're not allowed, because the DVD rights owner won't let them. There's no equivalent intellectual property rights to make cameras work, so there's no reason any vendor would intentionally make their own camera worse.
– Joseph Sible
Aug 9 at 15:10
add a comment |
Here is a patent for technology that will tell smart phone A not to take a picture of asset B.
https://www.theatlantic.com/technology/archive/2016/07/what-if-cameras-stopped-telling-the-truth/491150/
Now if all the smart phone vendors implemented this, similar to how the consumer grade DVD player vendors all agree on DVD copying then eventually you'd get the situation where most phones don't take the image. Not perfect of course.
Here is a patent for technology that will tell smart phone A not to take a picture of asset B.
https://www.theatlantic.com/technology/archive/2016/07/what-if-cameras-stopped-telling-the-truth/491150/
Now if all the smart phone vendors implemented this, similar to how the consumer grade DVD player vendors all agree on DVD copying then eventually you'd get the situation where most phones don't take the image. Not perfect of course.
answered Aug 9 at 9:35
Unicorn TearsUnicorn Tears
1,1431 silver badge5 bronze badges
1,1431 silver badge5 bronze badges
7
Literally all I needed was a filter in front of the lens to block IR light and I would be able to circumvent this. Doesn't surprise me that a patent from 2011 didn't catch on.
– MechMK1
Aug 9 at 9:38
2
@MechMK1 LOL that's right. Besides who wants to buy a smartphone that won't take pictures ...
– Unicorn Tears
Aug 9 at 10:57
12
DVD player vendors didn't voluntarily agree to restrict DVD copying. They all want to let consumers do that (because it would make their product more valuable to consumers, for no additional cost to them), but they're not allowed, because the DVD rights owner won't let them. There's no equivalent intellectual property rights to make cameras work, so there's no reason any vendor would intentionally make their own camera worse.
– Joseph Sible
Aug 9 at 15:10
add a comment |
7
Literally all I needed was a filter in front of the lens to block IR light and I would be able to circumvent this. Doesn't surprise me that a patent from 2011 didn't catch on.
– MechMK1
Aug 9 at 9:38
2
@MechMK1 LOL that's right. Besides who wants to buy a smartphone that won't take pictures ...
– Unicorn Tears
Aug 9 at 10:57
12
DVD player vendors didn't voluntarily agree to restrict DVD copying. They all want to let consumers do that (because it would make their product more valuable to consumers, for no additional cost to them), but they're not allowed, because the DVD rights owner won't let them. There's no equivalent intellectual property rights to make cameras work, so there's no reason any vendor would intentionally make their own camera worse.
– Joseph Sible
Aug 9 at 15:10
7
7
Literally all I needed was a filter in front of the lens to block IR light and I would be able to circumvent this. Doesn't surprise me that a patent from 2011 didn't catch on.
– MechMK1
Aug 9 at 9:38
Literally all I needed was a filter in front of the lens to block IR light and I would be able to circumvent this. Doesn't surprise me that a patent from 2011 didn't catch on.
– MechMK1
Aug 9 at 9:38
2
2
@MechMK1 LOL that's right. Besides who wants to buy a smartphone that won't take pictures ...
– Unicorn Tears
Aug 9 at 10:57
@MechMK1 LOL that's right. Besides who wants to buy a smartphone that won't take pictures ...
– Unicorn Tears
Aug 9 at 10:57
12
12
DVD player vendors didn't voluntarily agree to restrict DVD copying. They all want to let consumers do that (because it would make their product more valuable to consumers, for no additional cost to them), but they're not allowed, because the DVD rights owner won't let them. There's no equivalent intellectual property rights to make cameras work, so there's no reason any vendor would intentionally make their own camera worse.
– Joseph Sible
Aug 9 at 15:10
DVD player vendors didn't voluntarily agree to restrict DVD copying. They all want to let consumers do that (because it would make their product more valuable to consumers, for no additional cost to them), but they're not allowed, because the DVD rights owner won't let them. There's no equivalent intellectual property rights to make cameras work, so there's no reason any vendor would intentionally make their own camera worse.
– Joseph Sible
Aug 9 at 15:10
add a comment |
If A has knowledge of an unpatched vulnerability in B's phone, then it's possible that A's device could wirelessly upload an exploit to B's phone and interfere with the photo software's operation to prevent the photo being saved. If this is done passively, then A needs exploits for any phone that they could encounter. It also wouldn't work on older digital cameras that don't have wireless capability, but most people don't carry those anymore. The ability could only be available to a select few, since software and/or hardware manufacturers would patch the vulnerability if they got their hands on the exploit.
It's possible than an exploit like this exist, but it'd either be in the hands of a government agency using it for surveillance or someone who would sell it.
From the video clip, it doesn't look like there is physical interference with the camera, since you can see the target's face on the screen before the photo is taken. MechMK1 gave some good examples of physical interference methods, but there is also the case of a billionaire's yacht blocking paparazzi cameras by shooting lasers at the sensors and this purse that reacts to camera flashes with its own
add a comment |
If A has knowledge of an unpatched vulnerability in B's phone, then it's possible that A's device could wirelessly upload an exploit to B's phone and interfere with the photo software's operation to prevent the photo being saved. If this is done passively, then A needs exploits for any phone that they could encounter. It also wouldn't work on older digital cameras that don't have wireless capability, but most people don't carry those anymore. The ability could only be available to a select few, since software and/or hardware manufacturers would patch the vulnerability if they got their hands on the exploit.
It's possible than an exploit like this exist, but it'd either be in the hands of a government agency using it for surveillance or someone who would sell it.
From the video clip, it doesn't look like there is physical interference with the camera, since you can see the target's face on the screen before the photo is taken. MechMK1 gave some good examples of physical interference methods, but there is also the case of a billionaire's yacht blocking paparazzi cameras by shooting lasers at the sensors and this purse that reacts to camera flashes with its own
add a comment |
If A has knowledge of an unpatched vulnerability in B's phone, then it's possible that A's device could wirelessly upload an exploit to B's phone and interfere with the photo software's operation to prevent the photo being saved. If this is done passively, then A needs exploits for any phone that they could encounter. It also wouldn't work on older digital cameras that don't have wireless capability, but most people don't carry those anymore. The ability could only be available to a select few, since software and/or hardware manufacturers would patch the vulnerability if they got their hands on the exploit.
It's possible than an exploit like this exist, but it'd either be in the hands of a government agency using it for surveillance or someone who would sell it.
From the video clip, it doesn't look like there is physical interference with the camera, since you can see the target's face on the screen before the photo is taken. MechMK1 gave some good examples of physical interference methods, but there is also the case of a billionaire's yacht blocking paparazzi cameras by shooting lasers at the sensors and this purse that reacts to camera flashes with its own
If A has knowledge of an unpatched vulnerability in B's phone, then it's possible that A's device could wirelessly upload an exploit to B's phone and interfere with the photo software's operation to prevent the photo being saved. If this is done passively, then A needs exploits for any phone that they could encounter. It also wouldn't work on older digital cameras that don't have wireless capability, but most people don't carry those anymore. The ability could only be available to a select few, since software and/or hardware manufacturers would patch the vulnerability if they got their hands on the exploit.
It's possible than an exploit like this exist, but it'd either be in the hands of a government agency using it for surveillance or someone who would sell it.
From the video clip, it doesn't look like there is physical interference with the camera, since you can see the target's face on the screen before the photo is taken. MechMK1 gave some good examples of physical interference methods, but there is also the case of a billionaire's yacht blocking paparazzi cameras by shooting lasers at the sensors and this purse that reacts to camera flashes with its own
answered Aug 9 at 18:46
dexgeckodexgecko
1313 bronze badges
1313 bronze badges
add a comment |
add a comment |
I think there might be scenarios in which this could work. Imagine a person wearing a T-shirt with a QR code. Person B tries to shoot a photo with his smartphone. The smartphone recognises the QR code which
automatically opens a web browser showing a webpage stating "Stop
this"or
generates a buffer overflow due to buggy implementation of the
QR code interpreter.
3
I don't know of any stock camera apps that automatically resolve QR codes.
– Michael Frank
Aug 12 at 0:01
2
The default camera app on the iphone will detect qr-codes
– Robert
Aug 12 at 10:16
@MichaelFrank The default camera app on the Xiaomi Pocophone F1 detects QR codes.
– TheGreatCabbage
Aug 12 at 13:54
add a comment |
I think there might be scenarios in which this could work. Imagine a person wearing a T-shirt with a QR code. Person B tries to shoot a photo with his smartphone. The smartphone recognises the QR code which
automatically opens a web browser showing a webpage stating "Stop
this"or
generates a buffer overflow due to buggy implementation of the
QR code interpreter.
3
I don't know of any stock camera apps that automatically resolve QR codes.
– Michael Frank
Aug 12 at 0:01
2
The default camera app on the iphone will detect qr-codes
– Robert
Aug 12 at 10:16
@MichaelFrank The default camera app on the Xiaomi Pocophone F1 detects QR codes.
– TheGreatCabbage
Aug 12 at 13:54
add a comment |
I think there might be scenarios in which this could work. Imagine a person wearing a T-shirt with a QR code. Person B tries to shoot a photo with his smartphone. The smartphone recognises the QR code which
automatically opens a web browser showing a webpage stating "Stop
this"or
generates a buffer overflow due to buggy implementation of the
QR code interpreter.
I think there might be scenarios in which this could work. Imagine a person wearing a T-shirt with a QR code. Person B tries to shoot a photo with his smartphone. The smartphone recognises the QR code which
automatically opens a web browser showing a webpage stating "Stop
this"or
generates a buffer overflow due to buggy implementation of the
QR code interpreter.
edited Aug 11 at 20:02
schroeder♦
85.1k34 gold badges190 silver badges228 bronze badges
85.1k34 gold badges190 silver badges228 bronze badges
answered Aug 11 at 17:16
Uwe ZiegenhagenUwe Ziegenhagen
1113 bronze badges
1113 bronze badges
3
I don't know of any stock camera apps that automatically resolve QR codes.
– Michael Frank
Aug 12 at 0:01
2
The default camera app on the iphone will detect qr-codes
– Robert
Aug 12 at 10:16
@MichaelFrank The default camera app on the Xiaomi Pocophone F1 detects QR codes.
– TheGreatCabbage
Aug 12 at 13:54
add a comment |
3
I don't know of any stock camera apps that automatically resolve QR codes.
– Michael Frank
Aug 12 at 0:01
2
The default camera app on the iphone will detect qr-codes
– Robert
Aug 12 at 10:16
@MichaelFrank The default camera app on the Xiaomi Pocophone F1 detects QR codes.
– TheGreatCabbage
Aug 12 at 13:54
3
3
I don't know of any stock camera apps that automatically resolve QR codes.
– Michael Frank
Aug 12 at 0:01
I don't know of any stock camera apps that automatically resolve QR codes.
– Michael Frank
Aug 12 at 0:01
2
2
The default camera app on the iphone will detect qr-codes
– Robert
Aug 12 at 10:16
The default camera app on the iphone will detect qr-codes
– Robert
Aug 12 at 10:16
@MichaelFrank The default camera app on the Xiaomi Pocophone F1 detects QR codes.
– TheGreatCabbage
Aug 12 at 13:54
@MichaelFrank The default camera app on the Xiaomi Pocophone F1 detects QR codes.
– TheGreatCabbage
Aug 12 at 13:54
add a comment |
Part of this is theoretically possible, but the scenario as described is a TV fantasy.
There is active research into detecting lenses pointed at a target, but they are aimed at sniper rifles, not cameras, e.g. this patent. There are also multiple ways to detect hidden cameras, aimed at surveillance. And, of course, there's even an app for that.
These technologies could be combined into a detector that notices when someone points a camera at you, including that from a smartphone. Leaving questions of reliability and false positives aside, it could be combined with a technology like the anti-face-detection LEDs MechMK1 mentions to form a kind of selective camera camouflage.
But how would you get the other person's smartphone to show a message, or a picture entirely different from the one they were trying to take? The first case would require you to hack their smartphone, over the air, in real time. If that were feasible, it would already happen, and for more nefarious purposes. For a spy movie, that's the kind of rocket-shooting, underwater-driving car that we accept in such movies, but it's not real.
To show a completely different picture (the 2nd example in the clip) simply defies the laws of physics. You would have to project light into the camera aimed at you, but to fill the entire picture and not the tiny dot of your projector lens would require the light beams to bend in ways that light simply doesn't bend like.
Having detected a camera lens pointed at the victim, the countermeasure projects the desired image (message) directly into it, e.g. with a small scanning laser, completely overexposing and blowing out the face of the victim. Could be accompanied by a notification, or just make it powerful enough to ignite the attacker's phone battery, which will be notification enough.
– qris
Aug 12 at 13:03
1
@qris: You seem to miss the basic function of a lens. The laser emitting from one point will be focused by the lens on one pixel of the smartphone's camera. This is true regardless of where exactly the laser beam hits the lens, so a "scanning laser" won't help.
– MSalters
Aug 12 at 13:40
add a comment |
Part of this is theoretically possible, but the scenario as described is a TV fantasy.
There is active research into detecting lenses pointed at a target, but they are aimed at sniper rifles, not cameras, e.g. this patent. There are also multiple ways to detect hidden cameras, aimed at surveillance. And, of course, there's even an app for that.
These technologies could be combined into a detector that notices when someone points a camera at you, including that from a smartphone. Leaving questions of reliability and false positives aside, it could be combined with a technology like the anti-face-detection LEDs MechMK1 mentions to form a kind of selective camera camouflage.
But how would you get the other person's smartphone to show a message, or a picture entirely different from the one they were trying to take? The first case would require you to hack their smartphone, over the air, in real time. If that were feasible, it would already happen, and for more nefarious purposes. For a spy movie, that's the kind of rocket-shooting, underwater-driving car that we accept in such movies, but it's not real.
To show a completely different picture (the 2nd example in the clip) simply defies the laws of physics. You would have to project light into the camera aimed at you, but to fill the entire picture and not the tiny dot of your projector lens would require the light beams to bend in ways that light simply doesn't bend like.
Having detected a camera lens pointed at the victim, the countermeasure projects the desired image (message) directly into it, e.g. with a small scanning laser, completely overexposing and blowing out the face of the victim. Could be accompanied by a notification, or just make it powerful enough to ignite the attacker's phone battery, which will be notification enough.
– qris
Aug 12 at 13:03
1
@qris: You seem to miss the basic function of a lens. The laser emitting from one point will be focused by the lens on one pixel of the smartphone's camera. This is true regardless of where exactly the laser beam hits the lens, so a "scanning laser" won't help.
– MSalters
Aug 12 at 13:40
add a comment |
Part of this is theoretically possible, but the scenario as described is a TV fantasy.
There is active research into detecting lenses pointed at a target, but they are aimed at sniper rifles, not cameras, e.g. this patent. There are also multiple ways to detect hidden cameras, aimed at surveillance. And, of course, there's even an app for that.
These technologies could be combined into a detector that notices when someone points a camera at you, including that from a smartphone. Leaving questions of reliability and false positives aside, it could be combined with a technology like the anti-face-detection LEDs MechMK1 mentions to form a kind of selective camera camouflage.
But how would you get the other person's smartphone to show a message, or a picture entirely different from the one they were trying to take? The first case would require you to hack their smartphone, over the air, in real time. If that were feasible, it would already happen, and for more nefarious purposes. For a spy movie, that's the kind of rocket-shooting, underwater-driving car that we accept in such movies, but it's not real.
To show a completely different picture (the 2nd example in the clip) simply defies the laws of physics. You would have to project light into the camera aimed at you, but to fill the entire picture and not the tiny dot of your projector lens would require the light beams to bend in ways that light simply doesn't bend like.
Part of this is theoretically possible, but the scenario as described is a TV fantasy.
There is active research into detecting lenses pointed at a target, but they are aimed at sniper rifles, not cameras, e.g. this patent. There are also multiple ways to detect hidden cameras, aimed at surveillance. And, of course, there's even an app for that.
These technologies could be combined into a detector that notices when someone points a camera at you, including that from a smartphone. Leaving questions of reliability and false positives aside, it could be combined with a technology like the anti-face-detection LEDs MechMK1 mentions to form a kind of selective camera camouflage.
But how would you get the other person's smartphone to show a message, or a picture entirely different from the one they were trying to take? The first case would require you to hack their smartphone, over the air, in real time. If that were feasible, it would already happen, and for more nefarious purposes. For a spy movie, that's the kind of rocket-shooting, underwater-driving car that we accept in such movies, but it's not real.
To show a completely different picture (the 2nd example in the clip) simply defies the laws of physics. You would have to project light into the camera aimed at you, but to fill the entire picture and not the tiny dot of your projector lens would require the light beams to bend in ways that light simply doesn't bend like.
answered Aug 12 at 0:24
TomTom
6,4279 silver badges38 bronze badges
6,4279 silver badges38 bronze badges
Having detected a camera lens pointed at the victim, the countermeasure projects the desired image (message) directly into it, e.g. with a small scanning laser, completely overexposing and blowing out the face of the victim. Could be accompanied by a notification, or just make it powerful enough to ignite the attacker's phone battery, which will be notification enough.
– qris
Aug 12 at 13:03
1
@qris: You seem to miss the basic function of a lens. The laser emitting from one point will be focused by the lens on one pixel of the smartphone's camera. This is true regardless of where exactly the laser beam hits the lens, so a "scanning laser" won't help.
– MSalters
Aug 12 at 13:40
add a comment |
Having detected a camera lens pointed at the victim, the countermeasure projects the desired image (message) directly into it, e.g. with a small scanning laser, completely overexposing and blowing out the face of the victim. Could be accompanied by a notification, or just make it powerful enough to ignite the attacker's phone battery, which will be notification enough.
– qris
Aug 12 at 13:03
1
@qris: You seem to miss the basic function of a lens. The laser emitting from one point will be focused by the lens on one pixel of the smartphone's camera. This is true regardless of where exactly the laser beam hits the lens, so a "scanning laser" won't help.
– MSalters
Aug 12 at 13:40
Having detected a camera lens pointed at the victim, the countermeasure projects the desired image (message) directly into it, e.g. with a small scanning laser, completely overexposing and blowing out the face of the victim. Could be accompanied by a notification, or just make it powerful enough to ignite the attacker's phone battery, which will be notification enough.
– qris
Aug 12 at 13:03
Having detected a camera lens pointed at the victim, the countermeasure projects the desired image (message) directly into it, e.g. with a small scanning laser, completely overexposing and blowing out the face of the victim. Could be accompanied by a notification, or just make it powerful enough to ignite the attacker's phone battery, which will be notification enough.
– qris
Aug 12 at 13:03
1
1
@qris: You seem to miss the basic function of a lens. The laser emitting from one point will be focused by the lens on one pixel of the smartphone's camera. This is true regardless of where exactly the laser beam hits the lens, so a "scanning laser" won't help.
– MSalters
Aug 12 at 13:40
@qris: You seem to miss the basic function of a lens. The laser emitting from one point will be focused by the lens on one pixel of the smartphone's camera. This is true regardless of where exactly the laser beam hits the lens, so a "scanning laser" won't help.
– MSalters
Aug 12 at 13:40
add a comment |
Yes, it is doable, but it would be a voluntary feature of the camera app of the person that takes the photo. I do not think it is implemented in any common camera app, but there are implementations in many photocopiers, that prevent you from copying things with a certain dot pattern on it.
The EURion constellation is a special pattern, that can be recognized by these devices and stops people from copying banknotes. In addition to photocopiers, some software like Adobe Photoshop implements this as well.
People already experimented with printing EURion on t-shirts and other clothing. I do not think they were successful.
Other experiments involve adversarial pattern for image recognition neural networks, that prevent face detection or lead the camera not to focus on the face, when it is in auto-focus mode. Most of such patterns are rather obvious make-up, that you would not wear every day. Another technical device that uses infrared LEDs is mentioned in the post of MechMK1.
1
The reason why you can't print an EURion pattern on a shirt and have it block the camera is because cameras are generally not used to make copies of bank notes, since the perspective would distort the image. Furthermore, shirts are often bent and wavy when people are sitting or walking, so parts of the pattern may be obscured.
– MechMK1
Aug 12 at 11:38
add a comment |
Yes, it is doable, but it would be a voluntary feature of the camera app of the person that takes the photo. I do not think it is implemented in any common camera app, but there are implementations in many photocopiers, that prevent you from copying things with a certain dot pattern on it.
The EURion constellation is a special pattern, that can be recognized by these devices and stops people from copying banknotes. In addition to photocopiers, some software like Adobe Photoshop implements this as well.
People already experimented with printing EURion on t-shirts and other clothing. I do not think they were successful.
Other experiments involve adversarial pattern for image recognition neural networks, that prevent face detection or lead the camera not to focus on the face, when it is in auto-focus mode. Most of such patterns are rather obvious make-up, that you would not wear every day. Another technical device that uses infrared LEDs is mentioned in the post of MechMK1.
1
The reason why you can't print an EURion pattern on a shirt and have it block the camera is because cameras are generally not used to make copies of bank notes, since the perspective would distort the image. Furthermore, shirts are often bent and wavy when people are sitting or walking, so parts of the pattern may be obscured.
– MechMK1
Aug 12 at 11:38
add a comment |
Yes, it is doable, but it would be a voluntary feature of the camera app of the person that takes the photo. I do not think it is implemented in any common camera app, but there are implementations in many photocopiers, that prevent you from copying things with a certain dot pattern on it.
The EURion constellation is a special pattern, that can be recognized by these devices and stops people from copying banknotes. In addition to photocopiers, some software like Adobe Photoshop implements this as well.
People already experimented with printing EURion on t-shirts and other clothing. I do not think they were successful.
Other experiments involve adversarial pattern for image recognition neural networks, that prevent face detection or lead the camera not to focus on the face, when it is in auto-focus mode. Most of such patterns are rather obvious make-up, that you would not wear every day. Another technical device that uses infrared LEDs is mentioned in the post of MechMK1.
Yes, it is doable, but it would be a voluntary feature of the camera app of the person that takes the photo. I do not think it is implemented in any common camera app, but there are implementations in many photocopiers, that prevent you from copying things with a certain dot pattern on it.
The EURion constellation is a special pattern, that can be recognized by these devices and stops people from copying banknotes. In addition to photocopiers, some software like Adobe Photoshop implements this as well.
People already experimented with printing EURion on t-shirts and other clothing. I do not think they were successful.
Other experiments involve adversarial pattern for image recognition neural networks, that prevent face detection or lead the camera not to focus on the face, when it is in auto-focus mode. Most of such patterns are rather obvious make-up, that you would not wear every day. Another technical device that uses infrared LEDs is mentioned in the post of MechMK1.
answered Aug 12 at 10:47
alloallo
2,4284 silver badges21 bronze badges
2,4284 silver badges21 bronze badges
1
The reason why you can't print an EURion pattern on a shirt and have it block the camera is because cameras are generally not used to make copies of bank notes, since the perspective would distort the image. Furthermore, shirts are often bent and wavy when people are sitting or walking, so parts of the pattern may be obscured.
– MechMK1
Aug 12 at 11:38
add a comment |
1
The reason why you can't print an EURion pattern on a shirt and have it block the camera is because cameras are generally not used to make copies of bank notes, since the perspective would distort the image. Furthermore, shirts are often bent and wavy when people are sitting or walking, so parts of the pattern may be obscured.
– MechMK1
Aug 12 at 11:38
1
1
The reason why you can't print an EURion pattern on a shirt and have it block the camera is because cameras are generally not used to make copies of bank notes, since the perspective would distort the image. Furthermore, shirts are often bent and wavy when people are sitting or walking, so parts of the pattern may be obscured.
– MechMK1
Aug 12 at 11:38
The reason why you can't print an EURion pattern on a shirt and have it block the camera is because cameras are generally not used to make copies of bank notes, since the perspective would distort the image. Furthermore, shirts are often bent and wavy when people are sitting or walking, so parts of the pattern may be obscured.
– MechMK1
Aug 12 at 11:38
add a comment |
If the original question is limited to "hacking" just Person B's phone, then it's quite doable with only minor "suspension of disbelief."
First, Person A obtains B-phone's SIM id. Then Person A's phone checks the location of PhoneB, and if it's within, say, 10 meters, PhoneA checks an outgoing message (here's where some hack software would have to have been loaded) from PhoneB indicating a camera is activated. Now Person A is at least warned.
FWIW, it is completely reasonable to posit that NSA-level tools can force OTA installs onto PersonB's phone without any notifications being made. And for that matter, given another few years' worth of software development and smartphone processor capability, why not claim that such a software install includes facial recognition tools that could identify PersonA and then intercept the current camera image(s).
add a comment |
If the original question is limited to "hacking" just Person B's phone, then it's quite doable with only minor "suspension of disbelief."
First, Person A obtains B-phone's SIM id. Then Person A's phone checks the location of PhoneB, and if it's within, say, 10 meters, PhoneA checks an outgoing message (here's where some hack software would have to have been loaded) from PhoneB indicating a camera is activated. Now Person A is at least warned.
FWIW, it is completely reasonable to posit that NSA-level tools can force OTA installs onto PersonB's phone without any notifications being made. And for that matter, given another few years' worth of software development and smartphone processor capability, why not claim that such a software install includes facial recognition tools that could identify PersonA and then intercept the current camera image(s).
add a comment |
If the original question is limited to "hacking" just Person B's phone, then it's quite doable with only minor "suspension of disbelief."
First, Person A obtains B-phone's SIM id. Then Person A's phone checks the location of PhoneB, and if it's within, say, 10 meters, PhoneA checks an outgoing message (here's where some hack software would have to have been loaded) from PhoneB indicating a camera is activated. Now Person A is at least warned.
FWIW, it is completely reasonable to posit that NSA-level tools can force OTA installs onto PersonB's phone without any notifications being made. And for that matter, given another few years' worth of software development and smartphone processor capability, why not claim that such a software install includes facial recognition tools that could identify PersonA and then intercept the current camera image(s).
If the original question is limited to "hacking" just Person B's phone, then it's quite doable with only minor "suspension of disbelief."
First, Person A obtains B-phone's SIM id. Then Person A's phone checks the location of PhoneB, and if it's within, say, 10 meters, PhoneA checks an outgoing message (here's where some hack software would have to have been loaded) from PhoneB indicating a camera is activated. Now Person A is at least warned.
FWIW, it is completely reasonable to posit that NSA-level tools can force OTA installs onto PersonB's phone without any notifications being made. And for that matter, given another few years' worth of software development and smartphone processor capability, why not claim that such a software install includes facial recognition tools that could identify PersonA and then intercept the current camera image(s).
answered Aug 12 at 12:51
Carl WitthoftCarl Witthoft
993 bronze badges
993 bronze badges
add a comment |
add a comment |
TL;DR: i disagree with most answers here, Apple and Google could probably do it.
Apple could implement it for all iPhones, i guess Google could do the same for all androids phones, for all internet-connected phones under their control with GPS enabled. (system that asks an internet server if it's ok to use the camera in that GPS position before allowing a camera app, or any app, to take control of the camera hardware.. sure one could argue that "all you have to do is to disable internet and GPS", but they could also make those mandatory to take a picture, at least for non-rooted (or in iPhone-terminology, non-jailbroken) phones)
1
It’s an interesting idea, but it’s not currently possible.
– securityOrange
Aug 11 at 22:01
@securityOrange what is not currently possible? iPhones have everything required to implement it
– user1067003
Aug 11 at 22:14
Be that as it may, it’s not something that has been implemented. So again, it’s a really sweet idea and I personally dig it, but for users it’s not accessible (currently).
– securityOrange
Aug 11 at 22:25
@securityOrange question is "is it doable", not "is it implemented", and yeah, it's theoretically doable for Tim Cook. (and maybe POTUS could pull it off as a national security concern or whatever)
– user1067003
Aug 12 at 7:45
The question is not whether it is possible for a phone developer to create the functionality (of course they can), but whether a user could.
– schroeder♦
Aug 12 at 14:16
|
show 2 more comments
TL;DR: i disagree with most answers here, Apple and Google could probably do it.
Apple could implement it for all iPhones, i guess Google could do the same for all androids phones, for all internet-connected phones under their control with GPS enabled. (system that asks an internet server if it's ok to use the camera in that GPS position before allowing a camera app, or any app, to take control of the camera hardware.. sure one could argue that "all you have to do is to disable internet and GPS", but they could also make those mandatory to take a picture, at least for non-rooted (or in iPhone-terminology, non-jailbroken) phones)
1
It’s an interesting idea, but it’s not currently possible.
– securityOrange
Aug 11 at 22:01
@securityOrange what is not currently possible? iPhones have everything required to implement it
– user1067003
Aug 11 at 22:14
Be that as it may, it’s not something that has been implemented. So again, it’s a really sweet idea and I personally dig it, but for users it’s not accessible (currently).
– securityOrange
Aug 11 at 22:25
@securityOrange question is "is it doable", not "is it implemented", and yeah, it's theoretically doable for Tim Cook. (and maybe POTUS could pull it off as a national security concern or whatever)
– user1067003
Aug 12 at 7:45
The question is not whether it is possible for a phone developer to create the functionality (of course they can), but whether a user could.
– schroeder♦
Aug 12 at 14:16
|
show 2 more comments
TL;DR: i disagree with most answers here, Apple and Google could probably do it.
Apple could implement it for all iPhones, i guess Google could do the same for all androids phones, for all internet-connected phones under their control with GPS enabled. (system that asks an internet server if it's ok to use the camera in that GPS position before allowing a camera app, or any app, to take control of the camera hardware.. sure one could argue that "all you have to do is to disable internet and GPS", but they could also make those mandatory to take a picture, at least for non-rooted (or in iPhone-terminology, non-jailbroken) phones)
TL;DR: i disagree with most answers here, Apple and Google could probably do it.
Apple could implement it for all iPhones, i guess Google could do the same for all androids phones, for all internet-connected phones under their control with GPS enabled. (system that asks an internet server if it's ok to use the camera in that GPS position before allowing a camera app, or any app, to take control of the camera hardware.. sure one could argue that "all you have to do is to disable internet and GPS", but they could also make those mandatory to take a picture, at least for non-rooted (or in iPhone-terminology, non-jailbroken) phones)
edited Aug 11 at 19:09
answered Aug 11 at 19:04
user1067003user1067003
954 bronze badges
954 bronze badges
1
It’s an interesting idea, but it’s not currently possible.
– securityOrange
Aug 11 at 22:01
@securityOrange what is not currently possible? iPhones have everything required to implement it
– user1067003
Aug 11 at 22:14
Be that as it may, it’s not something that has been implemented. So again, it’s a really sweet idea and I personally dig it, but for users it’s not accessible (currently).
– securityOrange
Aug 11 at 22:25
@securityOrange question is "is it doable", not "is it implemented", and yeah, it's theoretically doable for Tim Cook. (and maybe POTUS could pull it off as a national security concern or whatever)
– user1067003
Aug 12 at 7:45
The question is not whether it is possible for a phone developer to create the functionality (of course they can), but whether a user could.
– schroeder♦
Aug 12 at 14:16
|
show 2 more comments
1
It’s an interesting idea, but it’s not currently possible.
– securityOrange
Aug 11 at 22:01
@securityOrange what is not currently possible? iPhones have everything required to implement it
– user1067003
Aug 11 at 22:14
Be that as it may, it’s not something that has been implemented. So again, it’s a really sweet idea and I personally dig it, but for users it’s not accessible (currently).
– securityOrange
Aug 11 at 22:25
@securityOrange question is "is it doable", not "is it implemented", and yeah, it's theoretically doable for Tim Cook. (and maybe POTUS could pull it off as a national security concern or whatever)
– user1067003
Aug 12 at 7:45
The question is not whether it is possible for a phone developer to create the functionality (of course they can), but whether a user could.
– schroeder♦
Aug 12 at 14:16
1
1
It’s an interesting idea, but it’s not currently possible.
– securityOrange
Aug 11 at 22:01
It’s an interesting idea, but it’s not currently possible.
– securityOrange
Aug 11 at 22:01
@securityOrange what is not currently possible? iPhones have everything required to implement it
– user1067003
Aug 11 at 22:14
@securityOrange what is not currently possible? iPhones have everything required to implement it
– user1067003
Aug 11 at 22:14
Be that as it may, it’s not something that has been implemented. So again, it’s a really sweet idea and I personally dig it, but for users it’s not accessible (currently).
– securityOrange
Aug 11 at 22:25
Be that as it may, it’s not something that has been implemented. So again, it’s a really sweet idea and I personally dig it, but for users it’s not accessible (currently).
– securityOrange
Aug 11 at 22:25
@securityOrange question is "is it doable", not "is it implemented", and yeah, it's theoretically doable for Tim Cook. (and maybe POTUS could pull it off as a national security concern or whatever)
– user1067003
Aug 12 at 7:45
@securityOrange question is "is it doable", not "is it implemented", and yeah, it's theoretically doable for Tim Cook. (and maybe POTUS could pull it off as a national security concern or whatever)
– user1067003
Aug 12 at 7:45
The question is not whether it is possible for a phone developer to create the functionality (of course they can), but whether a user could.
– schroeder♦
Aug 12 at 14:16
The question is not whether it is possible for a phone developer to create the functionality (of course they can), but whether a user could.
– schroeder♦
Aug 12 at 14:16
|
show 2 more comments
Thanks for contributing an answer to Information Security Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f215010%2fblocking-people-from-taking-pictures-of-me-with-smartphone%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
15
It probably would've been off-topic at Skeptics as it's not held to be a true claim in the original.
– WBT
Aug 9 at 19:26
24
I also heard you can cover your face with lemon juice to prevent security cameras from getting a picture of you. This guy tried it, and got caught. qz.com/986221/… You might now want to believe everything you see on TV/Internet.
– Steve Sether
Aug 9 at 20:54
8
Reminds me of this... youtube.com/watch?v=5rdXvtdSIF8
– barbecue
Aug 9 at 21:10
4
Use a tin-foil burka ...
– Hagen von Eitzen
Aug 10 at 14:48
9
Hang on, your smartphone uses 256-bit encryption. This is going to take a few seconds to hack. There, I'm in.
– Damon
Aug 10 at 19:06