Event JSON
{
"id": "00f1b15b8519912413a27e8297b7f16231c7656dbcb460177bde6953829d8705",
"pubkey": "0ddebc86c6a4795b5b9079c6034f5790262765f70c72e96bc3cf722148aa3599",
"created_at": 1716506654,
"kind": 1,
"tags": [
[
"e",
"9dddd2af89aa691249fbba83a160855ff4c732119cf5d2a90703beea427b153b",
"",
"root"
],
[
"p",
"0ddebc86c6a4795b5b9079c6034f5790262765f70c72e96bc3cf722148aa3599"
],
[
"proxy",
"https://infosec.exchange/@munin/112492980131773490",
"web"
],
[
"p",
"b37f2f2bd4bffd50b185d7fe859414fe112c86920b816236cc710474dd32dd6c"
],
[
"e",
"022bbf442b257e7e0d5d8f4a308dd95c83c49083a9a1a3114d7342143692a0e9",
"",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/munin/statuses/112492980131773490",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/munin/statuses/112492980131773490",
"pink.momostr"
]
],
"content": "This would be one of the cases where ai-generated stuff would be -less- effective, especially if this is intended not as extortion but as SWATting.\n\nSee, all the manufacturers have this big hash database of known CSA content; if the image is available on a given system or file, you don't have to make some analyst look at it - you have the computer measure the hash, and then determine whether that known image is present or absent.\n\nSo to apply involuntary kinetic consequences to someone, using a genuine CSA image to add to their Recall record would mean that the image would then be detectable in the database by the standard tooling for this.\n\nAnd since -possession- of the image is the crime, you now have involuntarily forced someone to be a criminal, and in a way which will be easily auditable.",
"sig": "468c2201e3f01b4ffacb9b0a637fc94c397d843b624bce74cb15d59176019703b864baaf68d72600b1ef465a58c2f97616f6ec79fd23cb5255ab88c668cefea3"
}