Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
littlecorner
19 days ago
|
parent
|
context
|
favorite
| on:
A case study in PDF forensics: The Epstein PDFs
I think some of the released documents included images of victims, which where redacted. So it's not
necessarily
malicious removals
dylan604
19 days ago
|
next
[–]
That's my understanding too, so archiving the unredacted images could mean holding CSAM.
streetfighter64
19 days ago
|
parent
|
next
[–]
Which is of course very convenient for the government, similar to when wikileaks got prosecuted for holding state secrets.
thatguy0900
19 days ago
|
prev
[–]
If we're assuming they didn't leave victims unredacted on purpose
streetfighter64
18 days ago
|
parent
|
next
[–]
Pretty devious tactic if so. Chilling effect on both any further witnesses and anybody interested in archiving the data (gives them an ethical conundrum at least). In addition to giving them (the feds) a convenient excuse to take down random docs.
thatguy0900
18 days ago
|
root
|
parent
|
next
[–]
Not about a ethical conondrum when rehosting. Anyone who rehosts the whole files can be accused of hosting child porn and doxxing and taken down.
direwolf20
18 days ago
|
root
|
parent
|
next
[–]
Very convenient for Epstein and his associates
jeltz
18 days ago
|
parent
|
prev
[–]
Looking at examples it looks way more like incompetence.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: