Skip to content

Commit 6c78134

Browse files
authored
Merge pull request #273 from contentauth/link-fixes
More verify/inspect fixes
2 parents bd1d441 + e298289 commit 6c78134

File tree

7 files changed

+22
-22
lines changed

7 files changed

+22
-22
lines changed

docs/getting-started/aca-inspect.mdx

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,12 @@ import aca_inspect from '@site/static/img/aca-inspect.png';
77
import inspect_actions from '@site/static/img/inspect_actions.png';
88
import MarkdownCell from '@site/src/components/MarkdownCell';
99

10-
The [**Inspect tool on Adobe Content Authenticity (Beta)**](https://verify.contentauthenticity.org) (often referred to as "ACA Inspect" or simply "Inspect") is a [C2PA conforming validator product](../conformance.mdx#validator-products) that validates and displays Content Credentials for various asset types.
10+
The [**Inspect tool on Adobe Content Authenticity (Beta)**](https://inspect.cr) (often referred to as "ACA Inspect" or simply "Inspect") is a [C2PA conforming validator product](../conformance.mdx#validator-products) that validates and displays Content Credentials for various asset types.
1111

1212
<img
1313
src={aca_inspect}
1414
style={{
15-
width: '500px',
15+
width: '600px',
1616
border: '1px solid #ccc',
1717
}}
1818
/>
@@ -21,12 +21,7 @@ For more information, see [Inspect Content Credentials](https://helpx.adobe.com/
2121

2222
## How to use Inspect
2323

24-
You can use Inspect to view Content Credentials for an asset in two ways:
25-
26-
- [Upload an asset file](#uploading-an-asset) from your local computer.
27-
- [Use an asset URL](#using-an-asset-url).
28-
29-
Supported asset file types include:
24+
You can use Inspect to view Content Credentials for the following asset file types:
3025

3126
- **Image**: AVIF, DNG, GIF, HEIC, HEIF, JPEG, PNG, SVG, TIFF, and WebP.
3227
- **Video and audio**: AVI, M4A, MOV, MP3, MP4, and WAV.
@@ -36,6 +31,11 @@ Supported asset file types include:
3631
When you first load the site and no asset is displayed on the page, Inspect shows the complete current list of supported file types.
3732
:::
3833

34+
You can use Inspect in two ways:
35+
36+
- [Upload an asset file](#uploading-an-asset) from your local computer.
37+
- [Use an asset URL](#using-an-asset-url).
38+
3939
### Uploading an asset
4040

4141
Click **Select a file from your device** then use the native picker or drag and drop a file to upload it and display information from the associated Content Credentials (if any) such as the author, the tools used to create the asset, and so on.
@@ -169,7 +169,7 @@ import verify_validation_error from '@site/static/img/verify-validation-error.pn
169169
Inspect displays this warning if the `validation_status` array contains any elements. For example, here is an snippet from the manifest of an image with a hard binding hash mismatch error,
170170

171171

172-
For example, a [this image](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-E-dat-CA.jpg) with a hard binding hash mismatch error, as shown in [this manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-E-dat-CA/manifest_store.json):
172+
For example, a [this image](https://inspect.cr?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-E-dat-CA.jpg) with a hard binding hash mismatch error, as shown in [this manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-E-dat-CA/manifest_store.json):
173173

174174

175175
```
@@ -182,7 +182,7 @@ For example, a [this image](https://verify.contentauthenticity.org?source=https:
182182
]
183183
```
184184

185-
Another example that can result in this message is shown in [this image](https://verify.contentauthenticity.org?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-E-clm-CAICAI.jpg) with a missing referenced claim, as shown in [this manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-E-clm-CAICAI/manifest_store.json):
185+
Another example that can result in this message is shown in [this image](https://inspect.cr?source=https://spec.c2pa.org/public-testfiles/image/jpeg/adobe-20220124-E-clm-CAICAI.jpg) with a missing referenced claim, as shown in [this manifest store](https://spec.c2pa.org/public-testfiles/image/jpeg/manifests/adobe-20220124-E-clm-CAICAI/manifest_store.json):
186186

187187

188188
Another example that can result in this message is a missing referenced claim, as shown in snippet of manifest data:

docs/getting-started/faqs.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Notable implementations using blockchain:
3535

3636
### Are Content Credentials about digital rights management?
3737

38-
No; Content Credentials do not enforce permissions for access to content. In many cases, the name displayed by validator products such as the [**Inspect tool on Adobe Content Authenticity (Beta)**](https://verify.contentauthenticity.org) (ACA Inpsect) is the name of the exporter of the content, not the rights owner.
38+
No; Content Credentials do not enforce permissions for access to content. In many cases, the name displayed by validator products such as the [**Inspect tool on Adobe Content Authenticity (Beta)**](https://inspect.cr) (ACA Inpsect) is the name of the exporter of the content, not the rights owner.
3939

4040
The [Title and signing information](aca-inspect.mdx#title-and-signing-information) in ACA Inspect refers to the name of the exporter. If the image was created with an Adobe Product such as Photoshop with Content Credentials (Beta) enabled, the "Produced by" section shows the name of the Adobe ID associated with the user who exported the image.
4141

docs/getting-started/index.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -93,9 +93,9 @@ import verify_unknown_source from '@site/static/img/verify-cc-unknown-source.png
9393

9494
The _C2PA trust list_ is a curated list of certification authorities (CAs) that are authorized to issue signing certificates for conforming generator products.
9595

96-
Conforming validator products such as the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) use the C2PA trust list to determine whether a Content Credential was issued using a certificate that can be traced back to a CA on the C2PA trust list.
96+
Conforming validator products such as the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) use the C2PA trust list to determine whether a Content Credential was issued using a certificate that can be traced back to a CA on the C2PA trust list.
9797

98-
Before the introduction of the C2PA trust list, during the early adoption phase of C2PA the C2PA [Verify tool](https://verify.contentauthenticity.org) used [the interim trust list](trust-list.mdx) to determine which certificates were considered valid and prevent unknown signers from appearing as valid. Verify will be updated to use the official [C2PA trust list](conformance.mdx#c2pa-trust-lists).
98+
Before the introduction of the C2PA trust list, during the early adoption phase of C2PA, the [Verify tool](https://verify.contentauthenticity.org) used [the interim trust list](trust-list.mdx) to determine which certificates were considered valid and prevent unknown signers from appearing as valid. Verify will be updated to use the official [C2PA trust list](conformance.mdx#c2pa-trust-lists).
9999

100100
## Identity
101101

@@ -122,7 +122,7 @@ Embedding a manifest in an asset usually increases the size of the file. Two thi
122122

123123
### Storing a manifest in the cloud
124124

125-
In addition to storing the manifest with the asset, Adobe tools use the _Adobe Content Credentials Cloud_, a public, persistent storage option for attribution and history data. Publishing to this cloud keeps files smaller and makes Content Credentials more resilient, because if stripped from an asset they can be recovered by searching with the [C2PA Verify tool](https://verify.contentauthenticity.org/). On the other hand, embedding the manifest keeps the file self-contained and means no web access is required to validate.
125+
In addition to storing the manifest with the asset, Adobe tools use the _Adobe Content Credentials Cloud_, a public, persistent storage option for attribution and history data. Publishing to this cloud keeps files smaller and makes Content Credentials more resilient, because if stripped from an asset someone can find them by searching with the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr). On the other hand, embedding the manifest keeps the file self-contained and means no web access is required to validate.
126126

127127
Currently, Adobe Content Credentials Cloud (ACCC) is only available to Adobe tools, though in the future other credentials clouds may become available if other organizations want to host a credential service. Currently, most manifests will be embedded in assets since ACCC is specific to Adobe.
128128

@@ -139,15 +139,15 @@ The example shown below illustrates one way to implement levels of disclosure:
139139

140140
- The Content Credentials pin <img src={cr_pin} width="25" /> shown over the image indicates that the image has Content Credentials (level 1).
141141
- Clicking on the pin displays level 2 information, and an **Inspect** button.
142-
- Clicking the **Inspect** button opens the image on the [Verify site](https://verify.contentauthenticity.org/) that provides level 3 information.
142+
- Clicking the **Inspect** button opens the image on [ACA Inpsect](https://inspect.cr/) that provides level 3 information.
143143

144144
<img src={cai_levels} width="800" />
145145

146146
## Example uses
147147

148148
Numerous Adobe tools and products implement Content Credentials. For example, you can optionally attach credentials to images you create or modify using [Photoshop](https://helpx.adobe.com/photoshop/using/content-credentials.html) and [Lightroom](https://helpx.adobe.com/lightroom-cc/using/content-credentials-lightroom.html). Additionally, all images created using the [Firefly](https://blog.adobe.com/en/publish/2023/03/21/bringing-gen-ai-to-creative-cloud-adobe-firefly) generative AI tool automatically have attached Content Credentials. [Behance displays Content Credentials](https://www.behance.net/blog/cai-on-behance) if they are attached to media shared on the site, and still images provided through [Adobe Stock](https://stock.adobe.com/) automatically have Content Credentials attached. Other Adobe products also support Content Credentials.
149149

150-
The [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) inspects image files and displays their Content Credentials if they exist. See [Using ACA Inspect](aca-inspect.mdx) for more information.
150+
The [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) inspects image files and displays their Content Credentials if they exist. See [Using ACA Inspect](aca-inspect.mdx) for more information.
151151

152152
Additionally, several other organizations have implemented CAI solutions, including:
153153

docs/signing/get-cert.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ A CSR is just an unsigned certificate that's a template for the certificate that
4848
A CSR comprises a public key, as well as ["distinguished name" information](https://knowledge.digicert.com/general-information/what-is-a-distinguished-name) that identifies the individual or organization requesting the certificate. The distinguished name includes a common name, organization, city, state, country, and e-mail address. Not all of these fields are required and will vary depending with the assurance level of the desired certificate.
4949

5050
:::tip
51-
For the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to display your organization name in the Content Credentials, your CSR must include the "O" or Organization Name attribute in the distinguished name information.
51+
For the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to display your organization name in the Content Credentials, your CSR must include the "O" or Organization Name attribute in the distinguished name information.
5252
:::
5353

5454
You sign the CSR with your private key; this proves to the CA that you have control of the private key that corresponds to the public key included in the CSR. Once the requested information in a CSR passes a vetting process and domain control is established, the CA may sign the public key to indicate that it can be publicly trusted.
@@ -74,7 +74,7 @@ You must select at least one of the extended key usage (EKU) fields that specify
7474

7575
### Organization name
7676

77-
If you want the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to display your organization name in the Content Credentials, your certificate must include the "O" or [Organization Name attribute](https://www.alvestrand.no/objectid/2.5.4.10.html) (OID value 2.5.4.10) in the distinguished name information. The CA may require some validation steps to prove you are part of that organization (details vary by CA).
77+
If you want the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to display your organization name in the Content Credentials, your certificate must include the "O" or [Organization Name attribute](https://www.alvestrand.no/objectid/2.5.4.10.html) (OID value 2.5.4.10) in the distinguished name information. The CA may require some validation steps to prove you are part of that organization (details vary by CA).
7878

7979
### Signature types
8080

docs/signing/local-signing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Accessing a private key and certificate directly from the file system is fine du
2626
Here is an example of getting signing credentials using [GlobalSign](http://globalsign.com/) certificate authority (CA) and then using them with C2PA Tool. GlobalSign is just one of many CAs. For a list of some others, see [Getting a security certificate](get-cert.md#certificate-authorities-cas).
2727

2828
:::note
29-
This example uses an inexpensive personal certificate, which is fine for development and testing, but in production, an enterprise certificate is strongly recommended. An enterprise certificate is required for [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to display your organization name when for signed assets.
29+
This example uses an inexpensive personal certificate, which is fine for development and testing, but in production, an enterprise certificate is strongly recommended. An enterprise certificate is required for [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to display your organization name when for signed assets.
3030
:::
3131

3232
### 1. Purchase credentials
@@ -157,5 +157,5 @@ This command displays the manifest attached to `signed_image.jpg` and should inc
157157
```
158158

159159
:::info
160-
You can also use the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) to confirm that your image was signed, but if you used a personal certificate (not an organization certificate) then it won't show [the organization name](get-cert.md#organization-name) and if your certificate is not on the [known certificate list](../getting-started/trust-list.mdx), it [displays the message](../getting-started/aca-inspect.mdx#title-and-signing-information) "The Content Credential issuer couldn't be recognized...."
160+
You can also use the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) to confirm that your image was signed, but if you used a personal certificate (not an organization certificate) then it won't show [the organization name](get-cert.md#organization-name) and if your certificate is not on the [known certificate list](../getting-started/trust-list.mdx), it [displays the message](../getting-started/aca-inspect.mdx#title-and-signing-information) "The Content Credential issuer couldn't be recognized...."
161161
:::

docs/signing/test-certs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,6 @@ While these test credentials are useful during development, you must [get your o
1515

1616
Although not recommended due to complexity and difficulty, you can create your own certificates for development and testing. Follow the requirements in the C2PA Technical Specification [X.509 Certificates](https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html#x509_certificates) and [Digital Signatures](https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html#_digital_signatures) sections.
1717

18-
For manifest claims signed with one of the test certificates, the [Inspect tool on Adobe Content Authenticity (Beta)](https://verify.contentauthenticity.org) will display the message "The Content Credential issuer couldn't be recognized." See [Using ACA Inspect](../getting-started/aca-inspect.mdx#signing-information) for more information.
18+
For manifest claims signed with one of the test certificates, the [Inspect tool on Adobe Content Authenticity (Beta)](https://inspect.cr) will display the message "The Content Credential issuer couldn't be recognized." See [Using ACA Inspect](../getting-started/aca-inspect.mdx#signing-information) for more information.
1919

2020

sidebars.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -198,7 +198,7 @@ const sidebars = {
198198
{
199199
type: 'doc',
200200
id: 'rust-sdk/docs/settings',
201-
label: 'Configuring the SDK',
201+
label: 'Configuring SDK settings',
202202
},
203203
{
204204
type: 'doc',

0 commit comments

Comments
 (0)