Quote:
Originally Posted by eschwartz
Also, what child pornography hash list? I can imagine more inefficient ways of recognizing and blocking child pornography, but I would have to resort to things like "throwing darts at a list of names".
|
Like the the lists provided by the forensic databases maintained by the FBI and Homeland Security Cyber Crimes Center.
http://www.nist.gov/oles/forensics/f...ence-table.cfm
This allows investigators to discover the presence of objectionable material without having to actually view it.