![]() ![]() Creating an intuitive experience around secure sourcing requires thoughtful design and reader education across media and technology organizations. Reader experience: Building on existing research, we know it is important to provide easy-to-understand context to help readers decide the trustworthiness of a photo.That will require collaboration about technical standards, workflows and user experience. Adoption: The success of secure sourcing will require wide-spread adoption, analogous to ‘herd immunity’ for misinformation where a missing ‘confirmed’ icon is rare enough to warrant investigation.This prototype is a first step in scaling a reader’s right to know to platforms and the open web. Secure sourcing will better accommodate readers' right to know, especially on social media platforms, without compromising journalists' and sources' rights. This balancing of rights has always existed, and journalism has developed many well-established principles to handle this. Eventually, the tools that publishers use to capture, edit and publish journalism would all work seamlessly with secure sourcing data. The goal of our efforts with working groups like the Content Authenticity Initiative and Project Origin is to bring this signing process to every step of the journalistic workflow. At the time the photo was taken, the workflow required to encode location and time of capture were not yet implemented, so this demonstration used placeholder data for those fields. This prototype is a proof-of-concept to demonstrate how information recorded by capture and editing tools is used in the publishing process. Readers can click on the icon to verify those signatures and learn more about the image. This icon conveys trust, much in the same way a lock icon next to a URL in a browser declares a secure connection. If those signatures are genuine, a ‘confirmed photograph’ icon can appear on the image. This codifies information such as the location and time the photo was taken, toning and cropping edits and the organization responsible for publication. Secure sourcing allows news professionals - photographers, editors and publishers - to ‘sign' their work at each stage of the reporting and publishing process, creating an end-to-end chain of trust for the photo’s metadata. The prototype uses secure sourcing, a cryptographic approach to engender confidence about the provenance of a photo. This ‘confirmed photograph’ is a working prototype representing a step toward ensuring readers’ right to know, built in collaboration with the Content Authenticity Initiative. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |