TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

OneDrive data automatically scanned for child porn

41 pointsby andremover 10 years ago

7 comments

tdicolaover 10 years ago
This is not news or a secret: <a href="http://blogs.microsoft.com/blog/2011/05/19/500-million-friends-against-child-exploitation/" rel="nofollow">http:&#x2F;&#x2F;blogs.microsoft.com&#x2F;blog&#x2F;2011&#x2F;05&#x2F;19&#x2F;500-million-frien...</a><p>You can learn more about the tech here: <a href="http://en.wikipedia.org/wiki/PhotoDNA" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;PhotoDNA</a>
RIMRover 10 years ago
How exactly does a private company generate the hashs&#x2F;&quot;PhotoDNA&quot; of all these child porn images? Are they granted some sort of kiddie-porn-license? More importantly, where do they get a hold of all of these images? Is there some sort of government database that they are given access to?<p>If such a database exists, could you imagine the public outrage that would result if someone hacked&#x2F;leaked it? I bet there are a bunch of images that only a handful of people ever had access to documented by our government...
评论 #8882210 未加载
评论 #8882249 未加载
dmixover 10 years ago
Google also scans gmail attachments for it as well. This has been known for a while and the subject of quite a few public court cases. I wouldn&#x27;t be surprised if Dropbox did it as well. Along with things of national security interest.<p>When local police get a warrant to do a forensic search of computers the judge often requires that they search harddrives using known image&#x2F;file hashes - as opposed to looking through each file by hand - in order to protect that persons constitutional right to privacy.<p>This right primarily applies to personal computers and doesn&#x27;t exist (as clearly) as defined by law when the files are stored on a remote cloud service. Although whether cloud services have a similar high threshold of assumed privacy is a recurring debate in criminal law, as storing your whole life in cloud services is a relatively new phenomenon.
评论 #8882029 未加载
ll123over 10 years ago
1. Download illegal porn using Tor.<p>2. Rename the file .DS_Store and copy to victim&#x27;s cloud folder<p>3. They go to jail and get killed by another inmate a year into their sentence. Justice prevails!
评论 #8882796 未加载
Karunamonover 10 years ago
With our (semi) benevolent corporate overlords in mind, are there any safe and cross platform ways to keep an encrypted container on these services?<p>I remember (but can&#x27;t find for the life of me) an article somewhere that stated you don&#x27;t want to put something like a Truecrypt volume on a service that does versioning, since the changes in the encrypted data each time you change something can be used to leak data.
评论 #8882285 未加载
评论 #8888474 未加载
voidrover 10 years ago
Ohhh the irony:<p><a href="http://vimeo.com/49048679" rel="nofollow">http:&#x2F;&#x2F;vimeo.com&#x2F;49048679</a><p><a href="http://en.wikipedia.org/wiki/Scroogled" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Scroogled</a>
ommunistover 10 years ago
And who knows for what else...