Blockchain & its use in deepfakes
By Akshay Govind Hande, Intern, Seth Associates
Keywords: Cyberlaw, cybersecurity, blockchain,Deep fake. Artificial intelligence
The concept of Blockchain
Blockchain is a decentralized and distributed digital ledger technology that records transactions across multiple computers in such a way that ensures the security, transparency, and longevity of the data. Each block in the chain consists of lists of transactions in which once a block is completed and is added to the chain in a chronological order. The structure makes it extremely difficult for any alteration of any single record without changing all chronological subsequent blocks, which provides a high level of security.
Working of Blockchain
The data is entered which consists of the Information like a video fingerprint which is submitted to the network, then blocks are created where the data is grouped into blocks with a unique identifier and a reference is attached to the previous block which creates a subsequent chain. These network is verified wherein the Computers on the network called miners validate the data and add the block to their copy of the ledger, once a block is added, it cannot be changed without changing all subsequent blocks which makes tampering extremely difficult and nearly impossible.
Fixed Record of Originals: Once the original video is registered on the blockchain which is created using a unique fingerprint like a digital hash then it remains as permanent record. Any alteration to such video will affect and change its fingerprint which makes it detectable.
Decentralized Verification: the blockchain doesn’t rely on a single source to verify a video it uses a network of computers to confirm its validity and authenticity. Such distributed system makes is difficult to manipulate the verification process, which is just like having hundreds of witnesses to a video’s originality instead of just one.
Transparency by Tracking: Blockchain tracks the history of a video, shows its origin and tracks how it is shared over the time. Such transparency allows users to understand the video’s authenticity and originality which is similar to the receipt for the video indicating its journey from creation to one’s screen.
Blockchain technology for protection against deepfakes
Digital Watermarks: strong, unique and tamper proof digital watermarks should be used for multimedia content at the time of creation. This watermark contains the data such as creator’s identity, the date of creation and other relevant details which makes it easy to identify.
Hashing: it is not suitable to store large file such as videos on blockchain instead blockchain uses to securely store a unique fingerprint of the original video such fingerprint is a cryptographic hash that is a fixed length code generated from the video data. Any alteration to the video would entirely change the hash thus makes it easy to detect a deepfake.
Immutable Records: All the information related to transactions of the creation, modification, and distribution of content should be stored on the blockchain. This creates and maintains a rigid and secure audit trail that can be used to track the history and source of the content.
Tracking Lineage: The blockchain technology can trace the origin and journey of a video fingerprint. This provides valuable information about the video’s authenticity and helps identify all the potential attempts for alteration.
Public Ledger: It’s an open access system that records and maintains all verification transactions such transparency allows anyone to audit the verification process and in order to ensure accountability.
Crimes through misuse of blockchain
- Money Laundering: Cybercriminals use blockchain for ulterior malafide purposes such as to obtain money by moving illegal funds through various cryptocurrencies, such process typically involves breaking large sums into smaller amounts to avoid detection or services are used that mix cryptocurrencies from various sources to make it difficult to trace their origins. or transfer of the mixed funds through multiple accounts or different cryptocurrencies to further make it complex the trail or conversion of all the acquired funds back into fiat currency or other assets which makes it appear legitimate.
- Ransomware Attacks: It is a type of malware which holds a victim’s data in an encrypted manner which the victim cant access . It includes blocking the access of user to their data and further demanding a ransom payment in cryptocurrencies to get back the access. The criminals are hard to trace due to anonymity which is provided by cryptocurrencies that makes it difficult to track the funds back to these criminals.
- Dark Web: illegal goods and services including drugs weapons and stolen data are frequently traded on dark web. Such transactions are usually conducted by using cryptocurrencies to maintain anonymity. These marketplaces mainly use blockchain technology to handle payments securely and pseudonymously to prevent detection.
- Phishing and Social Engineering: It is a cyberattack which involves malicious communications that trick people to give up their personal information or corporate data, most cybercriminals use phishing attacks to steal private keys and login credentials of cryptocurrency wallets and exchanges, victims are usually deceived through website or email that appear from legitimate source.
- Cryptojacking: A type of cybercrime wherein the attacker secretly and anonymously uses an individual’s computer or mobile device to mine cryptocurrency without their knowledge and consent. The criminal installs a program with script that gives them access to the device and then they use programs called coin miners to create cryptocurrency, which are then transferred to the criminal’s wallet.
- Making Deepfakes Harder to Trace: Blockchain technology which uses decentralized storage solutions like IPFS InterPlanetary File System or Filecoin help in storing and distributing deepfake files. Unlike the traditional storage method, the decentralized systems make it challenging and hard to remove content because files are not stored in a single location but are distributed across various nodes. This allows deepfake videos to be stored securely making it harder for authorities to take them down.
- Authentication: Blockchain used to create false authenticity records, for example a blockchain will store false metadata about the origin and authenticity of a deepfake video which would make it appear legitimate even though it is not. This will deceive individuals and systems which rely on blockchain for verification and authenticity of digital content.
Advisory & RBI warnings on cryptocurrencies: The RBI issued advisories and alerts highlighting the risks associated with cryptocurrency which includes financial instability, security threats and money laundering. The RBI issued an advisory stating that it has not given any one the authority to deal in cryptocurrency, however, the RBI circular restricting banks from dealing in cryptocurrency was struck down by the Supreme Court in Internet and mobile association of India v/s Reserve bank of India (2020). After this judgement, the banks were free from restriction by RBI, even though the RBI has not issued a comprehensive regulatory framework specifically for cryptocurrencies, the people are dealing in Cryptocurrency at their own risk .
RBI Press release 2013: warning issued to users, holders and traders of virtual currencies (VCs) like Bitcoin that possess different security risks. These digital currencies stored in electronic wallets are vulnerable and are open to threats thus can be hacked that would lead to password loss.
RBI Press release 2017: Vide press release dated February 1, 2017, RBI clarified that it has not given authority to any entity to operate and deal with Virtual Currencies.
RBI press release 2018: Due to the associated risk it has been decided that with immediate effect the entities regulated by the Reserve Bank will not deal in VCs or provide services related to it. Regulated entities which already provide services will end their relationship within three months from the date of this circular.
In The Internet and Mobile Association of India (IAMAI) vs. Reserve Bank of India (RBI) (2020): The Hon’ble Supreme court held that the circular alerting users of cryptocurrency affected right to trade guaranteed under Article 19(1)(g), complete ban on cryptocurrency related services was disproportionate, no evidence against harm suffered due to cryptocurrency therefore the RBI’s circular banning Virtual currencies is set aside on the ground of proportionality.
Bibliography:
OFFICIAL DOCUMENTATION:
- Reserve Bank of India, “RBI cautions users to Virtual Currencies against Risks” released on 24th December 2013 https://rbi.org.in/Scripts/BS_PressReleaseDisplay.aspx?prid=30247
- Reserve Bank of India, “RBI cautions users to Virtual Currencies” released on 1st February 2017 https://www.rbi.org.in/commonman/English/Scripts/PressReleases.aspx?Id=2152#:~:text=The%20Reserve%20Bank%20of%20India%20advises%20that%20it%20has%20not,so%20at%20their%20own%20risk.
- Reserve Bank of India, “Prohibition on dealing in virtual currencies (VCs)” released on 6th April 2018 https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11243
- Supreme Court of India, “INTERNET AND MOBILE ASSOCIATION OF INDIA versus RESERVE BANK OF INDIA” released on 4th March 2020 https://main.sci.gov.in/supremecourt/2018/19230/19230_2018_4_1501_21151_Judgement_04-Mar-2020.pdf
ORGANIZATIONAL ARTICLES:
- Struck Capital, “DEEPFAKES AND BLOCKCHAIN” https://struckcapital.com/deepfakes-and-blockchain/
- The World Economic Forum, “Blockchain can help combat the threat of deepfakes. Here’s how” https://www.weforum.org/agenda/2021/10/how-blockchain-can-help-combat-threat-of-deepfakes/
- INTERPOL, “Cryptojacking” https://www.interpol.int/en/Crimes/Cybercrime/Cryptojacking#:~:text=Cryptojacking%20is%20a%20type%20of,computing%20power%20to%20generate%20cryptocurrency.
WEB ARTICLES:
1.Shumbham Pandey and Gaurav Jadhav, “Emerging Technologies and law: Legal Status of Tackling Crimes Relating to Deepfakes in India” published on 17th March, 2023 https://www.scconline.com/blog/post/2023/03/17/emerging-technologies-and-law-legal-status-of-tackling-crimes-relating-to-deepfakes-in-india/
- David Grau, “Investigating 5 Kinds of Crypto Crime” published on 1st August, 2023 https://www.cognyte.com/blog/cryptocurrency-crime/