Hi Max,
Sorry I’ve been unavailable to review this until today – unfortunately for me the time zone is challenging on a Wednesday too. I did submit some material on data provenance to Andrew H a couple of weeks ago. I see that you have a section on RIDV with diagrams (slides 23-33) that covers (in much greater detail!) what I’d submitted on vulnerability points and attack modes.
We don’t mention “provenance” except indirectly on Slide 42 in the phrase “Using devices and data that are provably untampered”, without saying how.
Much of the material on mitigation talks about technological methods for detecting deepfakes and other exploits that are yet to be developed in practice, or (to my knowledge) are in their infancy – would welcome some references on this if available.
The subject of data provenance is equally tricky as the horse bolted before the stable door was closed, as they say.
That said, I’ve reviewed the slides as available on the Kantara Atlassian link. I should be Ok to get on the call tomorrow, and if there are gaps I can help fill, let me know. There’s a lot of good material in there – it will be good to get clarity on the intended audience and their expected level of expertise.
Is it an aspiration that the Kantara group and its membership should be a resource available to provide practical solutions to the “how to mitigate deepfakes” issues? This isn’t explicitly stated in the remit for the report (Slide 1) but could be inferred.
Best regards,
Martin
From: maxine most <cmaxmost@acuity-mi.com>
Sent: 18 November 2024 21:59
To: Jay Meier <jay@facetec.com>; dg-deepfakesidv@kantarainitiative.org
Subject: [DG-DeepfakesIDV] Re: Wednesday Kantara IDV Meeting
I have received some input. I will see what else I get today and then share with everyone tomorrow with remaining gaps
C. Maxine Most
Principal, Acuity Market Intelligence
+1 720 530 5836
640 W. Linden St, Louisville, CO 80027, USA