• AbouBenAdhem@lemmy.world
    link
    fedilink
    English
    arrow-up
    54
    arrow-down
    2
    ·
    edit-2
    19 hours ago

    First I’ve heard of StopNCII… what’s to stop it from being abused to remove (say) images of police brutality or anything else states or “participating companies” don’t want to be seen?

      • FreedomAdvocate@lemmy.net.au
        link
        fedilink
        English
        arrow-up
        6
        ·
        8 hours ago

        You guys are all acting like this “technology” is new lol. It’s the exact same way that all of the big companies detect CSAM - they have databases of hashes of known CSAM images, and every time you upload a file to their servers they hash your image and compare it to their database. If your uploads get a few matches, they flag your account for manual investigation.

        All this is doing is applying the same process for other types of images - non consensual intimate images, or “revenge porn” as it’s more commonly known.

        CSAM has systems in place to prevent abuse in the way you mention, as it uses databases managed by separate companies all over the world, and it has to match on multiple databases precisely to stop it from being abused that way. I would assume this is the same.