У нас вы можете посмотреть бесплатно C2PA Explained: The Standard Behind AI Content Verification или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this episode of Nerding Out With Viktor, Viktor Petersson explores AI content verification, C2PA, and digital trust with Dom Guinard, VP of Innovation at Digimarc and co-creator of the Web of Things. As misinformation and deepfakes spread faster than ever, tools like digital watermarks, verifiable credentials, and cryptographic signatures are becoming essential for establishing content authenticity online. Dom explains how C2PA works, why it's different from DRM, and how it could become the backbone for trusted digital media, from news photos to AI-generated art. They explore the technical, social, and regulatory landscape needed to make this work at scale, including hardware-based signing (like Leica cameras), privacy trade-offs on social platforms, and the promise of decentralized identity in verifying content at the source. Topics covered: *What C2PA is and how it supports AI content verification *C2PA vs. Verifiable Credentials (VCs)- where they overlap and differ *Why deepfakes demand transparent digital labeling *Watermarks, manifests, and perceptual hashes explained *Leica cameras and hardware-level provenance *Digimarc’s role in watermarking and recovery *The challenge of privacy vs. authenticity on social media *What it takes to reach global adoption of trust standards If you're interested in AI content verification, digital media trust, or the intersection of Web3, identity, and authenticity, this episode offers a thoughtful and highly relevant conversation. ---- Timestamps 00:00 – Guest introduction 01:00 – What the issue is and why it matters 03:00 – Who benefits and real-world relevance 05:00 – Challenges in adoption and current limitations 09:00 – Technical overview and how the system works 15:00 – Integration into tools, devices, and workflows 21:00 – Alternatives and improvements being developed 33:00 – Role of identity and trust in digital content 40:00 – Demonstration of the concept in action 54:00 – Final thoughts