• Passerby6497@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    16 days ago

    That’s where you print the downloaded PDF to a new PDF. New hash and same content, good luck tracing it back to me fucko.

    • Syn_Attck@lemmy.today
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      16 days ago

      Unfortunately that wouldn’t work as this is information inside the PDF itself so it has nothing to do with the file hash (although that is one way to track.)

      Now that this is known, It’s not enough to remove metadata from the PDF itself. Each image inside a PDF, for example, can contain metadata. I say this because they’re apparently starting a game of whack-a-mole because this won’t stop here.

      There are multiple ways of removing ALL metadata from a PDF, here are most of them.

      It will be slow-ish and probably make the file larger, but if you’re sharing a PDF that only you are supposed to have access to, it’s worth it. MAT or exiftool should work.

      Edit: as spoken about in another comment thread here, there is also pdf/image steganography as a technique they can use.

      • Zacryon@lemmy.wtf
        link
        fedilink
        English
        arrow-up
        1
        ·
        16 days ago

        Okay, got it. Print the PDF, then scan it and save as PDF.

        Or get some monks to get a handwritten copy, like the good old times.

        • sandbox@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          16 days ago

          it’s possible using steganographic techniques to embed digital watermarks which would not be stripped by simply printing to pdf.

            • Syn_Attck@lemmy.today
              link
              fedilink
              English
              arrow-up
              1
              ·
              16 days ago

              You should spread that idea around more, it’s pretty ingenious. I’d add first converting to B&W if possible.

          • Syn_Attck@lemmy.today
            link
            fedilink
            English
            arrow-up
            0
            ·
            edit-2
            16 days ago

            This is a great point. Image watermarking steganography is nearly impossible to defeat unless you can obtain multiple copies of the ‘same’ file from multiple users to look for differences. It could be a change of a single 5-15 pixels from one rgb code off.

            rgb(255, 251, 0)

            to

            rgb(255, 252, 0)

            Which would be imperceptable to the human eye. Depending on the number of users it may need to change more or less pixels.

            There is a ton of work in this field and its very interesting, for anyone considering majoring in computer science / information security.

            Another ‘neat’ technology everyone should know about is machine identification codes, or, the tiny secret tracking dots that color printers print on every page to identify the specific make, model, and serial number (I think?) of the printer the page was printed from. I don’t believe B&W printers have tracking dots, which were originally used to track creators of counterfeit currency. EFF has a page of color printers which do not include tracking dots on printed pages. This includes color LaserJets along with InkJets, although I would not be surprised if there was a similar tracking feature in place now or in the future “for safety and privacy reasons,” but none that I am aware of.

            • sus@programming.dev
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              16 days ago

              I wonder if it’s common for those steganography techniques to have some mechanism for defeating the fairly simple strategy of getting 2 copies of the file from different sources, and looking at the differences between them to expose all the watermarks.

              (I’d think you would need sections of watermark that are the same for any 2 or n combinations of copies of the data, which may be pretty easy to do in many cases, though the difference makes detecting the general watermarking strategy massively easier for the un-watermarkers)