MrMcCaslin
Highest Rated Comments
MrMcCaslin-5 karma
You propose “prosecuting perpetrators” as a alternate remedy. How would you suggest law enforcement could prosecute perpetrators if their actions are shielded by the anonymity of end-to-end encryption?
MrMcCaslin2 karma
Any alternatives to monitor/detect CSAM on end-to-end services that don't pose threats to cybersecurity? (Seeing that third-party access, lawful hacking and other "workarounds" all weaken security of end-to-end)
View HistoryShare Link