It helps journalists, etc, when files have digital signatures verifying who is attesting to it. If the WH has their own published public key for signing published media and more then it's easy to verify if you have originals or not.
Natanael
Bitlocker supports the same usecase, but everybody wants that automatic boot feature so...
It also lets you store a secondary key on a server and require the computer to be on trusted networks to be able to retrieve it to boot, but I've never ever heard of anybody using that
They're heavily involved with the development of the spec and guidance to OEMs on how to implement it
Bitlocker's threat model is physical access, though. And it's 50% of TPM's threat model too.
LLM is literally a machine made to give you more of the same
Challenges-reponse protocols are what's needed
His entire argument is literally debunked by Veritaseum's other video about game theory and cooperation. Nobody will be nice to a corporation where everybody knows the board members always will defect against you.
All the algorithms on bluesky are optional, there's both official feeds and a lot of 3rd party feeds (and they don't run on view counts!), so there's no trivial way to game the algorithms to reach the userbase
Managers from unaffected departments who are glad they have less internal competition. And that's pretty much it.
Warehouse management?
All of those qualifications require that you can handle a cascade of requests and manage tables
A MAC is symmetric and can thus only be verified by you or somebody who you trust to not misuse or leak the key. Regular digital signatures is what's needed here
You can still use such a signing circuit but treat it as an attestation by the camera's owner, not as independent proof of authenticity.