I mean, obviously this stuff is disgusting. But we live in an era when it’s easier than ever to take and keep pictures. So of course statistics like “number of images” are going to show huge increases. But I don’t care about the size of someone’s SD card, I care about kids.
-
Show this thread
-
The NYT article that underlies these statistics just seems *distressingly* unconcerned with the actual kids. You see a picture like this, the first question any reasonable person asks is: holy shit, does this mean a huge increase in exploited children?! Not this article.pic.twitter.com/X2HpAOivmN
4 replies 7 retweets 61 likesShow this thread -
The article even goes on to say that part of the reason these numbers are spiking is because of *improved detection efforts* at providers.
2 replies 3 retweets 47 likesShow this thread -
Mass surveillance of child sexual imagery seems like a particularly stupid and ineffective way to fight this crime. People who share these images aren’t terrorists in some tight cell structure. They’re just randos who find each other on the Internet.
3 replies 8 retweets 48 likesShow this thread -
If you want to bust online sharing rings, you don’t need to build a mass-scale image recognition system that would make Xi Jinping jealous. Just have your agents make some fake accounts and hang out in the wrong part of the web.
5 replies 26 retweets 92 likesShow this thread -
The fact that your systems *are recognizing so many of these images* is a good indication that either (1) they’re misfiring, or (2) your detection systems aren’t posing much of a deterrent.
2 replies 10 retweets 54 likesShow this thread -
Keep in mind that virtually every image recognition filter can be evaded by using a simple archive or encryption utility, and people aren’t even bothering to do *that*. So clearly you’re not achieving much of a deterrent effect.
2 replies 11 retweets 53 likesShow this thread -
I feel like we’re heading towards a world where the bad guys can stay safe with WinZIP.
8 replies 10 retweets 91 likesShow this thread -
Replying to @matthew_d_green
Someone disingenuous here: any remotely competent scanning tool scans within compressed archives, and it is easy conceptually to include a set of default passwords.
2 replies 0 retweets 0 likes -
Replying to @ncweaver @matthew_d_green
I can't overstress the importance of talking to the people doing this stuff rather than mocking it from first principles
2 replies 0 retweets 3 likes
Feel free to apply the above tweet to any domain of human experience
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.