Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: La Lydia

My theory is every lap top in the country has child porn on it somewhere.


36 posted on 01/02/2014 6:32:22 PM PST by DManA
[ Post Reply | Private Reply | To 35 | View Replies ]


To: DManA

Oh, Mr teapartier, you have been raising a ruckus for us in Washington. OH MY! Look at this! You have child porn on your computer.

Kiss your life goodby.


40 posted on 01/02/2014 6:39:49 PM PST by DManA
[ Post Reply | Private Reply | To 36 | View Replies ]

To: DManA

I sincerely hope not. What a horrible thought.


41 posted on 01/02/2014 6:54:01 PM PST by La Lydia
[ Post Reply | Private Reply | To 36 | View Replies ]

To: DManA; La Lydia
My theory is every lap top in the country has child porn on it somewhere.

Every computer can be infected with such materials - not necessarily intentionally. Here is an example of how it can be trivially done with no tools whatsoever.

Here, between these brackets, is an image: [] - can you see it? Its visible width and height is set to 1x1 pixel. Your eyes probably will ignore a speck of dust like that. But your computer downloads the entire image and stores it in the cache in its original format, however large it may be. (In this case it's 800x587 pixels.) This image is technically "on your computer," and there is no difference whatsoever if you downloaded it to watch in full size, or you downloaded it because it's part of some Web page and you never saw it. It's not trivial to prove that you haven't browsed to that image intentionally. The proof would require showing the Web page that contained the <img src="..."> tag with that URL. You are mostly OK if you are an expert in computers and know what to look for; or if your lawyer can hire a competent specialist. Everyone else will be convicted because the prosecution will not look for exculpatory evidence, and the public defender has no time or money to spend on digging the facts up.

I used this innocent image from Wikipedia for this example. But the attacker can use any image that he likes - even images that are not publicly known or seen by anyone. To plant this mine he only needs to write a HTML message, just like this one, and wait for the victims to collect the illegal payload, all without knowing it and without even being able to know about it.

There are countermeasures. The easiest, and the only one that a non-geek can afford, is to configure the browser so that all temporary files are removed after you close the browser. This does not entirely eliminate the cache because deleted files can linger for months on a large drive. But going into secure wipe software gets complicated fast. Seasoned geeks would browse in a VM with reverting to a snapshot after they are done. Another way to do it is by using a Live CD distribution of Linux, where nothing that you browse is saved on the hard disk. Firefox has some add-ons that can control automatic loading of images from some sites but not from other. Blocking ads entirely (using AdBlock and Ghostery and NoScript) would be a good first step because ad networks do not screen submitted ads, and from time to time undesirable images are sent to millions of customers.

43 posted on 01/02/2014 7:43:28 PM PST by Greysard
[ Post Reply | Private Reply | To 36 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson