Hacker News new | past | comments | ask | show | jobs | submit | Jigsy's comments login

We're talking about a country that jails people for anime drawings...


"Terrorists" as well.

All part of the plan to push for facial scanning everywhere.


I wouldn't trust stats from the IWF... or the UK in general since they classify drawings as CSAM/CSEM.


Chances are you're not the only person with that IP due to IPv4 exhaustion.

At least that's my theory.


I found out last week that it was illegal NOT to celebrate Bonfire Night until 1959.


The UK still loves nebulous laws, I see.


I'm not sure if I'm the outlier in this regard, but in my case, I simply stopped watching YouTube. (Good job, Google!)

I have been using Piped to watch a few programming related videos, though.


> If only we'd have known where that road ultimately ended.

A Toll Booth called a "Paywall."


On the topic of scanning a device for CSAM, even if this were extended to computers, and Microsoft/Linux/etc. coded it into the OS, how would this even work when it comes to RAM where an image isn't directly touching a hard drive? (Though I'm not sure how that would work exactly.)

Esp. in cases like isolated virtual machines running old versions of say Windows or Linux where child molesters and pedophiles don't have to worry about the scanning software.

I can't pretend to be an expert on the subject, but isn't a VM in a separate area of RAM where it doesn't bleed out?


The chatcontrol law does not require scanning on the OS level.

The chatcontrol law requires scanning on the ISP level and on the internet service level.

That means:

* ISPs are required to check for connections to flagged servers. They also have to check for illegal URLs (yes, HTTPS will make that pointless)

* Services like chat/e-mail/file-sharing services need to effectively check if a user is sending illegal material (no, the law doesn't take into account the complexity of open source ecosystems and the many options you have for client software and server hosting options)


They hypervisor or host OS can just read the memory.


Don't AMD server class processors have some way to encrypt VM memory so the host can't read it?

Looking around quickly, it seems to be Secure Encrypted Virtualization (SEV):

https://www.amd.com/en/developer/sev.html


I see.

That said, continuous RAM scanning would be incredibly resource intensive.


You do realize that countries (Denmark, Sweden, etc.) used to legally make CSEM back in the 70s, right?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: