Highest Rated Comments


MrMcCaslin2 karma

Any alternatives to monitor/detect CSAM on end-to-end services that don't pose threats to cybersecurity? (Seeing that third-party access, lawful hacking and other "workarounds" all weaken security of end-to-end)

MrMcCaslin-5 karma

You propose “prosecuting perpetrators” as a alternate remedy. How would you suggest law enforcement could prosecute perpetrators if their actions are shielded by the anonymity of end-to-end encryption?