child pornography
‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril
Richi Jennings | | Anti-Terrorism, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child sexual exploitation, childpornography, Counter-Terrorism, counterterrorism, CSAM, Data encryption, E2EE, encryption, end-to-end encryption, extremism, france, ICS, ICS/SCADA systems, Pavel Durov, Privacy, Russia, SB Blogwatch, Telegram, Telegram app, Terrorgram, Terrorism, terrorist, terrorist attack, Terrorist attacks
Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize ...
Security Boulevard
EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped
Richi Jennings | | Chat Control, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, CSAM, CSEM, E2EE, encryption, end-to-end encryption, eu, Europe, European Compliance, european election, European Governments, European legislation, European Union, European Union (EU), SB Blogwatch, signal, WhatsApp, Won’t somebody think of the children?
Ongoing European Union quest to break end-to-end encryption (E2EE) mysteriously disappears ...
Security Boulevard
Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Richi Jennings | | Australia, Australian Government, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child security online, child sexual exploitation, childpornography, CSAM, Digital Trust and Safety, Elon Musk, elon musk twitter, eSafety Commission, grooming, Julie Inman Grant, Linda Yaccarino, SB Blogwatch, trust and safety, Twitter, X
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah ...
Security Boulevard
Pics AND it Didn’t Happen: Sex Deepfake FBI Alert
Richi Jennings | | Adversarial machine learning, AI, AI (Artificial Intelligence), AI and machine learning, Artificial Intelligence, Artificial Intelligence (AI), Artificial Intelligence (AI)/Machine Learning (ML), child porn, child pornography, child sexual exploitation, childpornography, Deep Fake, Deep Fakery, Deep fakes, deepfake, deepfake videos, deepfakes, Evil Machine Learning, FBI, machine learning, Machine Learning security, porn, pornography, revenge porn, SB Blogwatch, sex, sextortion, sextortion scam, sextortionist, sexual harassment
Fake Pr0n Hint: Sextortionists stealing your innocent pictures to make AI nudes ...
Security Boulevard
Governments Try to Ban Encryption (Yet Again)
Richi Jennings | | Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, CSAM, encryption, end-to-end encryption, SB Blogwatch, signal, Threema, WhatsApp, Won’t somebody think of the children?
Déjà vu: Yet again, they’re tugging on the “think of the children” strings. But you can’t make math illegal ...
Security Boulevard
De-anonymizing Bitcoin
Bruce Schneier | | Bitcoin, child pornography, cryptocurrency, de-anonymization, tracing, Uncategorized
Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child porn ring. Within a few ...
Is Apple’s Client-Side Child Porn Scanning Legal?
Apple recently announced that it will start scanning devices individuals have purchased from Apple for both images that constitute child sexual abuse materials (CSAM) and for text messages or communications that are ...
Security Boulevard
Bill to Prevent Child Porn Could Kill Encryption
New legislation being introduced by Sen. Lindsay Graham ostensibly to prevent the spread of child porn and other child sexual abuse materials (CSAM) may have the effect of prohibiting the kinds of ...
Security Boulevard
PA Supreme Court Rules Defendant Need Not Decrypt Drive
Mark Rasch | | child pornography, Decryption, Disk encryption, Fifth Amendment, Password, Pennsylvania Supreme Court
One of the perennial issues facing courts is the extent to which the government can compel an individual to decrypt the contents of a file, a computer or a server. Jumping into ...
Security Boulevard
Court Says Minor Can Be Prosecuted for Sexting
A law designed to protect minors from child pornography was used to prosecute a Maryland high school student for sexting During the 2016-17 school year, a high school student with the initial ...
Security Boulevard