From occult steganography to C2PA

From occult steganography to C2PA

We understand the scope and development of Big Tech’s will to trace the identity of the author of any digital element. These are already operating standards; It is not clear whether digital control is already implemented beyond such standards, nor what consequences are on privacy and its possible manipulation.

September 28, 2025 · 5 min · 965 words ·  Fr.Sa.Ba