

And the CEO just did it again, because apparently it wasn’t enough backlash the first time.
And the CEO just did it again, because apparently it wasn’t enough backlash the first time.
What’s to stop actual child abusers from just photoshopping a 6th finger onto their images and then claiming that it’s AI generated?
Aside from the other arguments people have presented, this wrecks one of the largest reasons that people produce CSAM. Pedophiles are insular data hoarders by necessity, because actually creating and procuring it is such a big risk. Every time they go online to find new content, they’re at risk of stumbling into a honeypot. And producing it requires IRL work, and a LOT of risk of being caught/turned in by the victim. They tend to form tight-knit rings, and one of the only reliable ways to get into a ring as an outsider is to provide your own CSAM to the others. CSAM is traded in these rings like baseball cards, where you need fresh content in order to receive fresh content.
The data hoarding side of things is where all of the “cops bust pedophile with 100TB of CSAM” headlines come from; In reality, it was probably like 1TB of videos, (which is a lot, but not unheard of) but was backed up multiple times in multiple places, because losing it would be catastrophic for the CSAM producer; They can’t simply go grab a new blue ray of it. And the cops counted the full size of each backup disk, not just the space that was used.
Intentionally marking your content as AI-generated would ruin the trading value, because nobody will see it as valuable/worth trading for if it’s fake. At best, you won’t get anything for it. At worst, you’d be labeled a cop trying to pass off AI content to gather evidence.
My guess is that the algorithm is really good at predicting who will be likely to follow that kind of content, rather than report it. Basically, it flies under the radar purely because the only people who see it are the ones who have a vested interest in it flying under the radar.
This may be easier to do on your home network’s router. For instance, mine allows me to set it up as a VPN host, and also to connect to a VPN provider. It has the option to pass all of the connected clients through the connected VPN. So for instance, if I connect my phone to my home VPN, and my home router is connected to Mullvad, my phone’s traffic also gets passed through Mullvad.
Here’s a reminder that you can submit photos of your hotel room to law enforcement, to assist in tracking down CSAM producers. The vast majority of sex trafficking media is produced in hotels. So being able to match furniture, bedspreads, carpet patterns, wallpaper, curtains, etc in the background to a specific hotel helps investigators narrow down when and where it was produced.
The youngest Playboy model, Eva Ionesco, was only 12 years old at the time of the photo shoot, and that was back in the late 1970’s… It ended up being used as evidence against the Eva’s mother (who was also the photographer), and she ended up losing custody of Eva as a result. The mother had started taking erotic photos (ugh) of Eva when she was only like 5 or 6 years old, under the guise of “art”. It wasn’t until the Playboy shoot that authorities started digging into the mother’s portfolio.
But also worth noting that the mother still holds copyright over the photos, and has refused to remove/redact/recall photos at Eva’s request. The police have confiscated hundreds of photos for being blatant CSAM, but the mother has been uncooperative in a full recall. Eva has sued the mother numerous times to try and get the copyright turned over, which would allow her to initiate the recall instead.
If you do, I’d love to seed it. I’ve been looking for good copies of this for a while.
I have struggled to find good downloads for a lot of the older stuff. Looney Tunes and Tom & Jerry both come to mind; I’d love to have them on my server, but haven’t had the time to drive all the way to my parents’ place to get my old DVDs to rip. And even if I did get the DVDs, there’s a non-zero chance that they’re rotted. So I tried downloading them, but finding properly seeded torrents for content that old has been a struggle.
Isn’t Gunzilla Games the company that released a bitcoin miner disguised as a mobile game? I swear I remember seeing something about them being banned from the various app stores for trying to bury miners in their shit, but a basic google search didn’t find anything.
Edit: It looks like they’re trying to use blockchain to mint in-game items as NFTs.
Mozilla could remain funded if they stopped doing things like paying the CEO seven million dollars per year while laying off employees. If Mozilla dies, it will 100% be because of corporate greed.
Oracle bought (and quickly killed) it. It’s not under active development, and anything that claims otherwise is likely malicious. LibreOffice is a lot of the original OpenOffice devs who got fed up with the way things were going, and jumped ship.
Welcome to the biggest rabbit hole of your life. Syncthing itself isn’t huge, but the capacity to divest from the big cloud providers is. I say it’s a rabbit hole because you’ll quickly be finding new ways to use it.
Even better, wear loose generic clothes like a long black skirt and a baggy long sleeve shirt.
Investigators can narrow down suspects by using security footage to measure things like femur or forearm length. Baggy clothes make this much harder to do, because you can’t see exactly where the joints are. It introduces a lot of reasonable doubt that your defense lawyer can use to tear apart any video evidence they present.
You can disable the streaming completely if you really want to. It’s in your preferences, under the “Online Media Sources” section. You can disable it for only managed users, or disable it completely if you don’t even want access to it via the admin profile. Or just move it farther down the list, or hide it completely by unpinning it as a source.
It’s in French, but here’s a link:
https://www.watson.ch/fr/!884988581
Basically, Yen did an interview for Watson (a magazine) where he talked about the swedish government encroaching on encryption. He got political when he started talking about how all of the Swedish government officials were useless bureaucrats, and praised the US government’s methods instead.