logoalt Hacker News

TZubirilast Saturday at 4:24 PM0 repliesview on HN

I think there's a lot of precedent for invisible watermarks for source identification in both copyright protection and exfiltration identification. Of course this is quite possible without compute intensive ML models.