Embed Notice
HTML Code
Corresponding Notice
- Embed this notice@sally I would imagine the efficacy of the hash lists take a nosedive if the entire thing gets leaked. It's not that great of a tool to begin with for older, open hashing algorithms (MD5, SHA1).
There are also papers out there on certain newer, proprietary hash types having enough data in the hash to reconstruct CSAM to some degree (cough cough PhotoDNA) that an overzealous judge might feasibly count as distribution.
Regardless, it is not a can of worms I intend to crack open. All I can say is, if it was easy enough for me to sign up, anyone else can too.