Tuesday, December 11, 2018 [Tweets] [Favorites]

Tracking Leakers With Watermarked Screens

Cullen (via Ryan McLeod)::

One of the most fun jobs I ever had was figuring out how to embed the serial number of your Xbox 360 into rings emanating from the bottom right, so we could track and identify leaks

Majd Taby:

In 2010 someone at MobileMe encoded the IP address into the paddings and margins of the page to track leakers.

Sendatsu:

This thread post contains detailed information on how to view a hidden watermark which has been verified to exist embeded in JPG screenshots produced by the WoW client. The watermark itself includes, encoded in unencrypted bytes, the user’s account name (\World of Warcraft\WTF\Account\), an HH:MM timestamp and the IP address of the server.

1 Comment

One public beta cycle of Mac OS X did the same thing, if anyone remembers screenshots that were inexplicably "fuzzy" until shortly before GM

Stay up-to-date by subscribing to the Comments RSS Feed for this post.

Leave a Comment