this post was submitted on 18 Sep 2025
15 points (89.5% liked)

Technology

4232 readers
961 users here now

Which posts fit here?

Anything that is at least tangentially connected to the technology, social media platforms, informational technologies and tech policy.


Post guidelines

[Opinion] prefixOpinion (op-ed) articles must use [Opinion] prefix before the title.


Rules

1. English onlyTitle and associated content has to be in English.
2. Use original linkPost URL should be the original link to the article (even if paywalled) and archived copies left in the body. It allows avoiding duplicate posts when cross-posting.
3. Respectful communicationAll communication has to be respectful of differing opinions, viewpoints, and experiences.
4. InclusivityEveryone is welcome here regardless of age, body size, visible or invisible disability, ethnicity, sex characteristics, gender identity and expression, education, socio-economic status, nationality, personal appearance, race, caste, color, religion, or sexual identity and orientation.
5. Ad hominem attacksAny kind of personal attacks are expressly forbidden. If you can't argue your position without attacking a person's character, you already lost the argument.
6. Off-topic tangentsStay on topic. Keep it relevant.
7. Instance rules may applyIf something is not covered by community rules, but are against lemmy.zip instance rules, they will be enforced.


Companion communities

!globalnews@lemmy.zip
!interestingshare@lemmy.zip


Icon attribution | Banner attribution


If someone is interested in moderating this community, message @brikox@lemmy.zip.

founded 2 years ago
MODERATORS
top 8 comments
sorted by: hot top controversial new old
[–] DeathsEmbrace@lemmy.world 12 points 3 days ago (3 children)

It shouldnt be google and it should be the companies hosting the content in question. Why trust a third party especially if it’s google. They probably have AI scan that image regardless so they will definitely own it.

[–] misk@sopuli.xyz 4 points 3 days ago

The thing about internet is that anybody can do the hosting and they do not have to operate with same ethical standards as we do.

[–] 87Six@lemmy.zip 2 points 3 days ago

They should be going after the perpetrators what the fuck. Yea lets solve people seeing it, not people being graped...

[–] FreedomAdvocate@lemmy.net.au 2 points 3 days ago

It shouldn’t be Google who control which images they return in Google search? It’s their product……

[–] irotsoma@lemmy.blahaj.zone -2 points 3 days ago (2 children)

Problem is that this means the images have to be kept around in order to compare them. So, often these caches of child porn and other non-consensual images which often are poorly secured are targets of hacking and thus end up allowing the images to spread more rather than less. And the people sharing these things don't usually use the services that do this kind of scanning. So in general, it has more negative than positive effect. Instead, education to prevent abuse and support for the abused would be a better use of the money spent ln these things. But more difficult to profit from that and it doesn't support a surveillance state.

[–] misk@sopuli.xyz 9 points 3 days ago (1 children)

The whole point of using hashes here is to not store images.

[–] irotsoma@lemmy.blahaj.zone 1 points 3 days ago

The system that scours search results doesn't store the images, but they are stored. Maybe or maybe not by Google, but someone is collecting them and keeping them in order to feed whatever "AI" or hashing algorithm comes next.

And it's actually not the "whole point" in a technical sense. It's mentioned because they want to make it sound less harmful. You'd never compare actual images directly. That would take a ton of storage space and time to compare a large set of files byte for byte. You always use hashes. If it was easier or cheaper to use the images directly, they would, just like the "AI" agents that do this in other systems need the actual images not hashes.

[–] FreedomAdvocate@lemmy.net.au 1 points 3 days ago

Completely wrong.

They don’t need to keep the images because they hash them. They store the hashes - that’s the point. CSAM detection works the same way.

If your hash matches the database hash (on 2 or more databases), then it will be flagged for manual review. They don’t need to know which image it matched, because they look at your image and go “yeh that’s an intimate image so it’s a match”.