Additionally, why should have to go find (and propagate) kiddy porn?

On Thu, Aug 12, 2004 at 03:10:55PM -0400, Edward J. Huff wrote:
> On Sat, 2004-08-07 at 08:51, Toad wrote:
> > On Fri, Aug 06, 2004 at 11:25:46PM -0400, Edward J. Huff wrote:
> > > Kiddie porn is a minor issue compared to the copyright problem.
> > > For that, I think there will be a technological solution which
> > > will make it less easy to find on Freenet, so that no one without an ax
> > > to grind will think node operators are liable.   Regarding the copyright
> > > problem, come and get us.  We aren't going to give up without a fight.
> > 
> > Uh, like what?
> 
> I think everyone agrees it's not hard to convert a base 64 CHK key to
> the hex representation used in filenames, and to delete matching files
> from the datastore.  (I don't see why SSK's would be any more difficult
> but I haven't actually looked at the details there).
> 
> It is not hard to find out the "well known" kiddie porn CHK's. Monitor
> the KP Frost boards; also pick out KP from the descriptions in TFE.  
> 
> In order to avoid  decrypting actual KP, use freenet.client.cli.Main
> with --noredirect and with the output redirected to /dev/null.  The
> metadata comes out on stderr, and includes the CHK's of any splitfile
> blocks.
> 
> So, without any help from developers, users could set up scripts which
> delete all "well known" KP CHK's from their datastores.  Also, given
> patches and scripts, they could compile a version of fred (or distrubute
> a jar which goes ahead of freenet.jar on classpath) which gives
> immediate RNF to such keys.
> 
> If they do that, I think no jury would find such a node operator
> criminally liable for carrying KP which he could not find out about
> without devoting large amounts of time looking for the keys.  Hopefully,
> no prosecutor would go after such node operators, since being dragged
> into court is a considerable inconvenience even if the verdict is
> innocent.  (The police rarely offer apologies, let alone compensation).
> 
> On the other hand, investigators running freenet nodes themselves can
> easily find nodes which fail to censor well known KP CHK's.  There is no
> need to "break" freenet to be able to do this.  
> 
> If the investigators are decent people, they will give such node
> operators a chance to voluntarily censor the KP, and even provide a list
> of CHK's which should be censored.  The investigators themselves are
> able to look at the actual content and decide if it is KP without risk
> of illegal possession of decrypted KP.
> 
> ---- file keyBlacklist/KeyBlacklist.java ----
> package keyBlacklist;
> 
> import freenet.client.Base64;
> import freenet.support.HexUtil;
> 
> public class KeyBlacklist
> {
>     public static void main(String[] args)
>       throws freenet.client.IllegalBase64Exception
>     {
>       int i;
>       for (i = 0; i < args.length; i++) {
>           if (args[i].startsWith("CHK@")) {
>               byte[] key = Base64.decode(args[i].substring(4));
>               System.out.println(HexUtil.bytesToHex(key));
>           } else {
>               byte[] key = HexUtil.hexToBytes(args[i]);
>               System.out.println(Base64.encode(key));
>           }
>       }
>     }
> }
> ---- compile and run script ----
> /usr/java/j2sdk1.4.2_05/bin/javac -classpath \
>    freenet.jar keyBlacklist/KeyBlacklist.java 
> /usr/java/j2sdk1.4.2_05/bin/jar cvf keyBlacklist.jar \
>     keyBlacklist/KeyBlacklist.class 
> /usr/java/j2sdk1.4.2_05/bin/java -classpath \
>    freenet.jar:keyBlacklist.jar \
>     keyBlacklist.KeyBlacklist [EMAIL PROTECTED]
> 



-- 
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.

Attachment: signature.asc
Description: Digital signature

_______________________________________________
chat mailing list
[EMAIL PROTECTED]
http://news.gmane.org/gmane.network.freenet.general

Reply via email to