Unlike a certain platform with an orange logo, we aren’t keen on sheltering pedophiles. During your stay on Based Count, feel free to make as many wood chipper jokes as you deem necessary.
Unlike a certain platform with an orange logo, we aren’t keen on sheltering pedophiles. During your stay on Based Count, feel free to make as many wood chipper jokes as you deem necessary.
…maybe we should just develop the woodchipper service? A monitoring app that when notified of an IP will distribute said IP to many destinations when sharing CSAM. Destinations like hacker mailing lists, automated attack vectors, even have a phonebook of all police so to automate the reporting process.
Introducing the WCAAS model - Wood Chipper As A Service - coming to a white van near you.
On a serious note, unfortunately those people use VPNs and tend to be very careful with their IPs. A technological solution won’t do, chipping is the only cure.
Then ban the VPN service’s IP range and mail them the reason why.
I know that sounds like “a slippery slope”, but I’m talking fediverse here and not Facebook.
We have blocklists for platforms, why not VPN’s? Give the user a CloudFlare cached HTMX stating “your VPN is used as an attack vector to spread CSAM. Please consider using another VPN or turning it off altogether”.
We don’t need to tie a user to the IP, only the content.
Actually that has been proposed over the admin matrix chat and I think it could be a smart move. They suggested going as far as banning all VPN IP ranges. But I guess right now everyone is really waiting for the devs to say/do something, before the admins start fixing the problem themselves.
I think some alliance should be made to maintain a blacklist of VPNs known to spread harmful or otherwise dangerous materials, along with the infrastructure to automatically inform VPN’s of why ranges have been banned.
Carpet banning all VPN’s shouldn’t be okay, as it prohibits people who justifiably need to maintain a level of anonymity access to the fediverse as a posting platform. Though TOR should be a valid endpoint since it is inherently slow.
It’s a prickly set of problems to be sure, but political dissidents, whistleblowers, investigative journalists and otherwise politically compromised people of good intent should be protected.