Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I think there's a lot of precedent for invisible watermarks for source identification in both copyright protection and exfiltration identification. Of course this is quite possible without compute intensive ML models.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: