Categories: TV News Check

Irdeto Approved For C2PA Trust List, Enabling Verified Media Provenance For Live And Broadcast

Irdeto has been approved by the Coalition for Content Provenance and Authenticity (C2PA) for the C2PA Trust List, establishing the company as a trusted certificate authority within the standard’s ecosystem.

The approval, dated March 14, follows the release of C2PA spec v2.3, which adds a protocol for signing live and broadcast media. The update extends C2PA beyond static assets to live streaming formats such as DASH and HLS, enabling media segments to be hashed and signed in real time without changes to codecs, manifests, DRM or CDNs — a key requirement for broadcasters, pay TV operators and streamers.

As an approved issuer, Irdeto can provide keys and credentials that bind identity and provenance to content at scale across video, images, audio, documents and AI‑generated media. The company said the capability lets provenance travel with content without disrupting delivery or degrading quality, making adoption practical for existing workflows.

The move comes amid rising manipulation of digital media by generative AI, including realistic fake news videos that mimic well-known network branding. “AI is rapidly changing how content is created, and how easily it can be manipulated,” said Andrew Bunten, COO of Video Entertainment at Irdeto. “C2PA gives the industry a practical, open way to prove where content comes from, and we’re proud to support that effort as an approved issuer of trusted credentials.”

Proponents say standardized, interoperable authenticity signals are becoming essential to preserve trust and protect brand integrity as synthetic content proliferates.

The post Irdeto Approved For C2PA Trust List, Enabling Verified Media Provenance For Live And Broadcast appeared first on TV News Check.

rssfeeds-admin

Share
Published by
rssfeeds-admin

Recent Posts

Par Chadha on Why 2026’s Real AI Winners Will Be the Ones Solving for Productivity, Compliance, and the “Smallest Million”

There is a certain kind of technology conversation that is everywhere in 2026: louder, faster,…

46 minutes ago

New PlugX USB Worm Spreads Across Multiple Continents Using DLL Sideloading

A newly discovered variant of the PlugX worm is silently crossing borders by hiding inside…

47 minutes ago

Hackers Leave Credential Stuffing Botnet Wide Open With Full Worker Access and Root Passwords

A live credential stuffing botnet targeting Twitter/X accounts has been found completely exposed to the…

47 minutes ago

Codex Hacks Samsung TV to Root by Exploiting World-Writable Driver Interfaces

OpenAI’s Codex AI model successfully escalated privileges to root on a real Samsung Smart TV…

47 minutes ago

CISA Warns of Fortinet SQL Injection Vulnerability Actively Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a critical…

48 minutes ago

New Janela RAT Campaign Uses Fake MSI Installers and Malicious Browser Extensions to Steal Data

A new malware campaign involving a Remote Access Trojan called Janela RAT has been actively…

48 minutes ago

This website uses cookies.