WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

107

(post is archived)

[–] 4 pts

If someone where to figure out the imbedded codes that the FBI inserts into their CP that they distribute (the code Apple is scanning for,) then turn around and insert that same code into MSM photos commonly found online, it would be hilarious.

[–] 1 pt

It's not a code embedded into CP, it's a hash of the image/video content. So what you'd want to do is find out one or more of the hashes (legal to possess, it's just an alphanumeric identifier) then create an image/video that causes a "hash collision" (i.e., same output hash but different content).

This is easier said than done but is perfectly possible, especially by using GPU for highly-distributed hash calculations.

[–] 1 pt

back when the "patriot Act" abuses were first revealed, anons put a whole list of targeting used in their searches on-line and I converted a chunk of it into a non-printing closing tag for every one of my emails for a few years. bunch of others did too just for the "lulz"