• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
this new tool can retrieve pixelated text from redacted documents

This New Tool Can Retrieve Pixelated Text from Redacted Documents

You are here: Home / General Cyber Security News / This New Tool Can Retrieve Pixelated Text from Redacted Documents
February 17, 2022

The practice of blurring out text making use of a process termed pixelation may perhaps not be as safe as earlier considered.

Though the most foolproof way of concealing sensitive textual information is to use opaque black bars, other redaction strategies like pixelation can attain the opposite outcome, enabling the reversal of pixelized text again into its authentic type.

Dan Petro, a guide researcher at offensive security agency Bishop Fox, has demonstrated a new open up-source software termed Unredacter to reconstruct text from the pixelated illustrations or photos, successfully leaking the incredibly information and facts that was meant to be guarded.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

The resource is also seen as an improvement around an present utility named Depix, which performs by on the lookout up what permutations of pixels could have resulted in specific pixelated blocks to recuperate the textual content.

Pixelated Text from Redacted Documents

The menace product operates on the underlying hypothesis that given a piece of text that contains each redacted and un-redacted information and facts, the attacker uses the data about the font dimensions and style gleaned from the distinct textual content to predict the hid data.

This is significantly from the to start with time very similar procedures have been proposed to get back again redacted facts from pixelated material. In January 2022, researchers from Beneficial Security in-depth a approach to reverse pixelation in videos.

Prevent Data Breaches

“Information creators and journalists ought to be knowledgeable of the added dangers when redacting details in films and use a adequately high mosaic dimension/blur radius, or greater nevertheless, use an opaque, solitary-colored box,” researcher Fabian Braunlein mentioned.

Petro concurs. “The base line is that when you need to have to redact textual content, use black bars covering the entire textual content. By no means use anything else. No pixelation, no blurring, no fuzzing, no swirling.”

“The very last point you will need just after producing a fantastic technological document is to unintentionally leak delicate information and facts simply because of an insecure redaction technique,” Petro additional.

Located this short article appealing? Comply with THN on Facebook, Twitter  and LinkedIn to read additional distinctive material we write-up.


Some areas of this short article are sourced from:
thehackernews.com

Previous Post: «researchers warn of a new golang based botnet under continuous development Researchers Warn of a New Golang-based Botnet Under Continuous Development
Next Post: More than 6,000 new UK cyber security jobs created in 2021 more than 6,000 new uk cyber security jobs created in»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
  • New Russian-Linked Malware Poses “Immediate Threat” to Energy Grids
  • Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities
  • 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
  • Romania’s Safetech Leans into UK Cybersecurity Market
  • New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids
  • Barracuda Warns of Zero-Day Exploited to Breach Email Security Gateway Appliances
  • Advanced Phishing Attacks Surge 356% in 2022
  • Expo Framework API Flaw Reveals User Data in Online Services
  • NCSC Warns Against Chinese Cyber Attacks on Critical Infrastructure

Copyright © TheCyberSecurity.News, All Rights Reserved.