Embed Notice
HTML Code
Corresponding Notice
- Embed this notice@alex @realcaseyrollins > In the case of the hash list, while it is not possible to reverse engineer a hash, it is possible for bad actors to develop a crawler or other products that could use the hash set to find criminal images which they would otherwise not have knowledge or sight of.
Are they retarded? Hashing the data requires downloading the data, so they would have already obtained a copy of the CSAM. The only "utility" would be locating the CSAM in the data that they have previously scraped. And at that point they already have it...