Google, Facebook, Twitter join crackdown on child porn

Google, Facebook, Twitter, Microsoft and Yahoo will be among the first technology companies to use the Internet Watch Foundation’s “hash list” to identify and remove child abuse images uploaded to their services, the British anti-abuse organization announced Monday.

Not to be confused with a hashtag, a hash is a string of code that can serve as the digital fingerprint of an image. Sharing the list of fingerprints with Internet companies will allow victims’ images to be identified and removed more quickly, preventing them from being repeatedly shared. Full Article

Related posts

Subscribe
Notify of

We welcome a lively discussion with all view points - keeping in mind...

 

  1. Your submission will be reviewed by one of our volunteer moderators. Moderating decisions may be subjective.
  2. Please keep the tone of your comment civil and courteous. This is a public forum.
  3. Swear words should be starred out such as f*k and s*t and a**
  4. Please avoid the use of derogatory labels.  Use person-first language.
  5. Please stay on topic - both in terms of the organization in general and this post in particular.
  6. Please refrain from general political statements in (dis)favor of one of the major parties or their representatives.
  7. Please take personal conversations off this forum.
  8. We will not publish any comments advocating for violent or any illegal action.
  9. We cannot connect participants privately - feel free to leave your contact info here. You may want to create a new / free, readily available email address that are not personally identifiable.
  10. Please refrain from copying and pasting repetitive and lengthy amounts of text.
  11. Please do not post in all Caps.
  12. If you wish to link to a serious and relevant media article, legitimate advocacy group or other pertinent web site / document, please provide the full link. No abbreviated / obfuscated links. Posts that include a URL may take considerably longer to be approved.
  13. We suggest to compose lengthy comments in a desktop text editor and copy and paste them into the comment form
  14. We will not publish any posts containing any names not mentioned in the original article.
  15. Please choose a short user name that does not contain links to other web sites or identify real people.  Do not use your real name.
  16. Please do not solicit funds
  17. No discussions about weapons
  18. If you use any abbreviation such as Failure To Register (FTR), Person Forced to Register (PFR) or any others, the first time you use it in a thread, please expand it for new people to better understand.
  19. All commenters are required to provide a real email address where we can contact them.  It will not be displayed on the site.
  20. Please send any input regarding moderation or other website issues via email to moderator [at] all4consolaws [dot] org
  21. We no longer post articles about arrests or accusations, only selected convictions. If your comment contains a link to an arrest or accusation article we will not approve your comment.
  22. If addressing another commenter, please address them by exactly their full display name, do not modify their name. 
ACSOL, including but not limited to its board members and agents, does not provide legal advice on this website.  In addition, ACSOL warns that those who provide comments on this website may or may not be legal professionals on whose advice one can reasonably rely.  
 

9 Comments
Inline Feedbacks
View all comments

Now this could be a positive advance and policy that might actually achieve the intended purpose without violating peoples rights. If its not abused in ways that are unintended which I don’t see how it could be.

While this is a good idea as a stand alone idea I’m equally positive it’s a bad idea. Why is that you wonder? It’s because historically this is the sort of thing that people can’t resist abusing far beyond it’s stated and intended purpose. I think this is the only censorship I would agree with; but I’m very sure that the thought police will rationalize a myriad of ways to abuse this to censor many other things. And we probably won’t find out about that until the next brave whistle blower comes along.

Since 1999 I’ve operated hosting businesses and operated a couple of Internet Service Providers. As a software developer and system administrator (i wear many hats), we use hashes to help us determine if a file is the one we expect, or if it has been modified in some way. I find it fascinating that this technology wasn’t been applied in this way a very long time ago. We use this technology already to help us locate potential viruses on our systems and in our networks.

Seems like a good idea, but it is not. File hashes can be easily manipulated by someone who knows what they are doing. This includes creating images that will produce the same hash value with the images being different. Also whose definition of child pornography is being used? What if certain hash lists have less hashes than others?

For every image these sites remove, another five are uploaded by teenagers with a PC or Smartphone, high speed internet/WiFI and a locking bedroom door while their parents are in the living room staring at their own Facebook accounts wondering why their high school sweetheart from twenty years ago has not liked their update about sneezing yesterday.

I suppose they need to make an effort to show they are making an effort. If these sites truly wanted to protect kids, they would ban them from using their services. But that would cost money, and when it comes to choosing between exploiting a little girl’s vagina or losing 20% off the bottom line, the vagina loses every time. Since Chris Kelly is getting rich from exploiting little girl’s vaginas by enabling child predators to have a shopping cart full of children, he is a functionally sex offender himself. If he truly loved kids, he would get them off the internet.