Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There's also not really any need to trick the system or manipulate other files to generate collisions. Spreading one of the original law-breaking files to unwilling targets would work as a trigger just the same.


But the recipient would know they had gotten CSAM and wouldn't pass it along.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: