Skip to main content

Facebook wants your nude photos to fight revenge porn

he program asks those who fear their intimate photos may be shared on Facebook, Instagram or Messenger to send the photos to Facebook's special team for review.
The special team "creates a human-unreadable, numerical fingerprint of it" and stores it as a "photo hash" to prevent someone from uploading the photo in the future.
Like all photos, the image will be cross-examined in a database of "photo hashes" and if it matches a flagged photo, Facebook will prevent it from being posted or shared.
The pilot program is limited to Australia.
To minimize confusion, Facebook explained how the program works:
  1. Australians can complete an online form on the eSafety Commissioner’s official website.
  2. To establish which image is of concern, people will be asked to send the image to themselves on Messenger.
  3. The eSafety Commissioner’s office notifies us of the submission (via their form). However, they do not have access to the actual image.
  4. Once we receive this notification, a specially trained representative from our Community Operations team reviews and hashes the image, which creates a human-unreadable, numerical fingerprint of it.
  5. We store the photo hash—not the photo—to prevent someone from uploading the photo in the future. If someone tries to upload the image to our platform, like all photos on Facebook, it is run through a database of these hashes and if it matches we do not allow it to be posted or shared.
  6. Once we hash the photo, we notify the person who submitted the report via the secure email they provided to the eSafety Commissioner’s office and ask them to delete the photo from the Messenger thread on their device. Once they delete the image from the thread, we will delete the image from our servers.

Comments

Post a Comment

Popular posts from this blog

Top 3 Virtualization Technology in world

  VMware Find a major data center anywhere in the world that doesn't use VMware, and then pat yourself on the back because you've found one of the few. VMware dominates the server virtualization market. Its domination doesn't stop with its commercial product, VMware vSphere. VMware also dominates the desktop-level virtualization market and perhaps even the free server virtualization market with its VMware Server product. VMware remains in the dominant spot due to its innovations, strategic partnerships and rock-solid products     Microsoft Microsoft came up with the only non-Linux hypervisor, Hyper-V, to compete in a tight server virtualization market that VMware currently dominates. Not easily outdone in the data center space, Microsoft offers attractive licensing for its Hyper-V product and the operating systems that live on it. For all Microsoft shops, Hyper-V is a viable solution that has only gotten more competitive in the virtualization space w...

Wireless Adapter and Wi-Fi Driver Version Number

Identify Your Intel® Wireless Adapter and Wi-Fi Driver Version Number Option one: Automatically identify and update your drivers and software The easiest way to identify your Intel® Wireless Adapter and driver version is to use the Intel® Driver & Support Assistant (Intel® DSA). Intel DSA identifies your adapter and updates your driver to the latest version, if needed. Note Updating drivers automatically deletes older driver versions. Option two: Manually identify your Intel ® Wireless Adapter and Wi-Fi driver version Select your operating system, and follow the steps to identify your Intel® Wireless Adapter and driver. Note The Intel® Wireless Adapter name identified is applicable to both Wi-Fi and Bluetooth® technology. For Bluetooth driver version, see Identify Your Intel® Wireless Adapter and Bluetooth® Driver Version. Locate the task bar in the bottom right corner of your desktop. Se...