Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think there's a lot of precedent for invisible watermarks for source identification in both copyright protection and exfiltration identification. Of course this is quite possible without compute intensive ML models.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: