InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media
Technology

Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media

September 11, 2025 3 Min Read
Share
Add Google Pixel 10 C2PA support to verify the reliability of AI-generated media
SHARE

On Tuesday, Google announced that it is taking out the box a new Google Pixel 10 phone with a standard coalition of content origins and reliability (C2PA) to examine the origins and history of digital content.

Therefore, C2PA content credential support has been added to the Pixel Camera and Google Photos apps for Android. According to Google, the move is designed to further enhance transparency in digital media.

C2PA Content Credentials are tamper-proof, encrypted digital manifesto that provides a verifiable source of digital content, such as images, videos, and audio files. According to Adobe, the metadata type acts as a “digital nutrition label” and provides information about the creator, how it was created, and whether it was generated using artificial intelligence (AI).

“The Pixel Camera App has achieved Assurance Level 2, the highest security rating currently defined by the C2PA Compliant Program,” says Google’s Android Security and C2PA Core Team. “Mobile app guarantee level 2 is currently only available on Android platforms.”

“Even if a Pixel 10 phone is captured when the device goes offline, it ensures that images captured by the native camera app are reliable after the certificate expires.”

This feature is possible using a combination of Google Tensor G5, Titan M2 security chip, and hardware-assisted security features built into the Android operating system.

Google has implemented C2PA for secure, verifiable and offline use, ensuring that the source data is reliable, and the process is not personally identifiable and works even when the device is not connected to the internet.

This is used –

  • Proof of Android Keys that allows Google C2PA Certified Authority (CAS) to verify that it is communicating with a real physical device
  • The hardware-backed Android Key certificate includes the package name and signing certificate associated with the app that requested the generation of the C2PA signing key to check for requests originating from the trusted enrollment app
  • C2PA Generation and Storage Claim Key Signing Key Using Android Strongbox on Titan M2 Security Chip for Tamper Resistance
  • Proof of anonymous hardware assistance to certify new encryption keys generated without knowing who is using it
  • Unique certificates to sign each image, make it “encryptically impossible” to praise the creator
  • Offline Time Stamp Authority (TSA) components on devices in the tensor chip to generate encrypted timestamps when the camera shutter is pressed
See also  Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

“C2PA content credentials are not the only solution to identify the source of digital media,” Google said. “But they are concrete steps towards more media transparency and trust as we continue to unravel more human creativity with AI.”

Share This Article
Twitter Copy Link
Previous Article The game about digging holes has hot new cooperative rivals. The game about digging holes has hot new cooperative rivals.
Next Article AI will shake up the call center industry, but some tasks are better left to humans AI will shake up the call center industry, but some tasks are better left to humans

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up
Technology

A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up

6 Min Read
Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Technology

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

4 Min Read
Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys
Technology

Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys

4 Min Read
Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks
Technology

Hackers exploit WordPress sites to power next-generation ClickFix phishing attacks

7 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?