Skip to main content

Facebook wants your nude photos to fight revenge porn

he program asks those who fear their intimate photos may be shared on Facebook, Instagram or Messenger to send the photos to Facebook's special team for review.
The special team "creates a human-unreadable, numerical fingerprint of it" and stores it as a "photo hash" to prevent someone from uploading the photo in the future.
Like all photos, the image will be cross-examined in a database of "photo hashes" and if it matches a flagged photo, Facebook will prevent it from being posted or shared.
The pilot program is limited to Australia.
To minimize confusion, Facebook explained how the program works:
  1. Australians can complete an online form on the eSafety Commissioner’s official website.
  2. To establish which image is of concern, people will be asked to send the image to themselves on Messenger.
  3. The eSafety Commissioner’s office notifies us of the submission (via their form). However, they do not have access to the actual image.
  4. Once we receive this notification, a specially trained representative from our Community Operations team reviews and hashes the image, which creates a human-unreadable, numerical fingerprint of it.
  5. We store the photo hash—not the photo—to prevent someone from uploading the photo in the future. If someone tries to upload the image to our platform, like all photos on Facebook, it is run through a database of these hashes and if it matches we do not allow it to be posted or shared.
  6. Once we hash the photo, we notify the person who submitted the report via the secure email they provided to the eSafety Commissioner’s office and ask them to delete the photo from the Messenger thread on their device. Once they delete the image from the thread, we will delete the image from our servers.

Comments

Post a Comment

Popular posts from this blog

Broadcast

In general, to broadcast information is to transmit it to many receivers. For example, a radio station broadcasts a signal to many listeners, and digital TV subscribers receive a signal that is broadcast by their TV provider. In computer networking, broadcasting is the process of sending data packets to multiple recipients all at once. For instance, a local area network can be configured so that any device on the network can broadcast a message to all the others. When a networked device wants to broadcast, it transmits a data packet to the network's broadcast address . The network hardware, such as routers or switches, does the work of sending the packet to every other device in the group. The group of eligible devices is called a broadcast domain . This type of communication is also called all-to-all , because every device can transmit a message simultaneously to every other device. Broadcast networking is supported by IPv4, the network protocol used by most of toda...

Top 3 Virtualization Technology in world

  VMware Find a major data center anywhere in the world that doesn't use VMware, and then pat yourself on the back because you've found one of the few. VMware dominates the server virtualization market. Its domination doesn't stop with its commercial product, VMware vSphere. VMware also dominates the desktop-level virtualization market and perhaps even the free server virtualization market with its VMware Server product. VMware remains in the dominant spot due to its innovations, strategic partnerships and rock-solid products     Microsoft Microsoft came up with the only non-Linux hypervisor, Hyper-V, to compete in a tight server virtualization market that VMware currently dominates. Not easily outdone in the data center space, Microsoft offers attractive licensing for its Hyper-V product and the operating systems that live on it. For all Microsoft shops, Hyper-V is a viable solution that has only gotten more competitive in the virtualization space w...

Wireless Adapter and Wi-Fi Driver Version Number

Identify Your Intel® Wireless Adapter and Wi-Fi Driver Version Number Option one: Automatically identify and update your drivers and software The easiest way to identify your Intel® Wireless Adapter and driver version is to use the Intel® Driver & Support Assistant (Intel® DSA). Intel DSA identifies your adapter and updates your driver to the latest version, if needed. Note Updating drivers automatically deletes older driver versions. Option two: Manually identify your Intel ® Wireless Adapter and Wi-Fi driver version Select your operating system, and follow the steps to identify your Intel® Wireless Adapter and driver. Note The Intel® Wireless Adapter name identified is applicable to both Wi-Fi and Bluetooth® technology. For Bluetooth driver version, see Identify Your Intel® Wireless Adapter and Bluetooth® Driver Version. Locate the task bar in the bottom right corner of your desktop. Se...