- Joined
- Aug 20, 2006
- Messages
- 13,000
Facebook is testing a new detection system that relies on a database of file hashes, a cryptographic signature computed for each file. Once an abuser tries to upload an image marked as "revenge porn" in its database, its system will block the upload process. But in order to build a database of "revenge porn" file hashes, Facebook will need potential victims to upload a copy of the nude photo in advance.
This process involves the victim sending a copy of the nude photo to his own account, via Facebook Messenger. This implies uploading a copy of the nude photo on Facebook Messenger, the very same act the victim is trying to prevent. The victim can then report the photo to Facebook, which will create a hash of the image that the social network will use to block further uploads of the same photo. Facebook says it's not storing a copy of the photo, but only computing the file's hash and adding it to its database of revenge porn imagery.
This process involves the victim sending a copy of the nude photo to his own account, via Facebook Messenger. This implies uploading a copy of the nude photo on Facebook Messenger, the very same act the victim is trying to prevent. The victim can then report the photo to Facebook, which will create a hash of the image that the social network will use to block further uploads of the same photo. Facebook says it's not storing a copy of the photo, but only computing the file's hash and adding it to its database of revenge porn imagery.