Federal agents hide illegal content in embedded data on assets all over the internet. If they want to, they can "randomly search" you, find the illegal content they hid, and blackmail you into committing terrorism for them.
This is the main reason why Any Forums is allowed to stay up.
maybe, but if the data is hidden they can't prove a criminal act and therefore the blackmail is useless, stenography is not new tech, it's as old as computers, i will continue to collect rare pepes. sneed
Josiah Clark
I'm assuming reality doesn't matter because judges look at warrants for 2 seconds before signing
Samuel Davis
>saves your pic as a JPEG checkmate fedboi also if you can't into steganography you better learn, a lot of information is about to become illegal
Hudson Morgan
Yeah so let’s not share images. Who cares? It’s bullshit. Trying to scare everyone. If they really do this shit they can just have an actual force to attack CP people not just everyone can’t share images now. Ignore it. If the come after you over this shoot them.
Nathaniel Green
id like to point out this coincides with apple "scanning" images on your phone.
Daniel Hughes
I'm just a simple farmer, no one is coming after me. I just think people deserve to know. why are you getting to percent people from learning this information?
William Nguyen
Thanks to Nvidia they can do more than that. They can produce real CP from machine learning AND put you into it, voice included. It's gonna take 40+ years for the general public to finally realize that audio, photo, and video evidence no longer matters.
Nolan Jones
I believe it.
Kevin Thomas
and it doesn't really matter what I do because I'll do what I want regardless of what a judge does or doesn't do feckless bastards and bitches is all they are
Luke Lewis
tell others, then.
Andrew Butler
They could do that on any website
Ian Johnson
yes.
Lucas Wilson
Ok the bit of all that I could read basically just said they own my cpu
Yea no shit I’m not running temple os
Is your point that op is retarded and they don’t need to embed shit into images to plant shit on your computer? Because that’s a good point. And you could have just typed that.
>assertions of fact because i know >see it MUST be true humans are so funny.
Alexander Thompson
they do it on every website. but some websites are less permanent than others and are thus easier fields to sow, i assume.
Joshua Allen
humans are cursed. self awareness is a curse.
Dominic Moore
>more bullshit you're an emo troon.
Colton Bennett
you're a smoothbrain. why would they infiltrate your machines whether they can easily deliver illicit goods without you even knowing, willingly?
obviously they do both. especially with phones at "random checkpoints"
William Nelson
no u
Ethan White
>obviously they do both >>this isn’t about one not the other >>>makes it about the other >>>>then makes it about both What a retard. Delete Any Forums from your switch then faggot
Jack Cruz
but how does bear know what apples is??
Alexander Russell
"Coincidently" SSDs never really delete your data. Who know if some glownigger tech can get stuff you deleted hours ago. With HDDs if you overwrite the relevant sectors it's very difficult if possible at all to retrieve deleted data (but metadata might remain thanks to your filesystem crap).
Leo Bell
The best answer is to keep your head down. Not "submissive" down, but ducking below the hedges. If you're onto you, you already made a mistake. It's like all these genuine retards buying firearms on paper. They go to a gun store and get a background check. That act destroys their right to bear arms. You're you're getting BG checked on anything, you fucked up.
i dont care about any of these systems i dont engage with them i am a simple farmer just trying to educate people
Isaac Ward
It’s fearmongering, the solution is to not download or share images not run some data analysis on every image you share.
Bentley Morgan
fun fact, if you ever call out from jail you need to first read a short story into the phone, and I'm certain it hit's every syllable needed to manufacture speech. >also pretty sure silicone valley could do that now.
Owen James
yes i agree. there's no point in being paranoid. but people should be informed. and I am informing them. you seem to not like that.
Anyway I'll reiterate : feds and high ranking military industrial complex personnel routinely seed massive amounts of innocent assets onto the internet in automatically downloaded images like banner ads and website icons. then, if the feds don't like you, they'll "randomly search" you somewhere like the border or the airport and detain you based on the content they planted on you. they will start you, torture you, and then give you your freedom if you commit terrorism for the feds.
apple scans your phones images automatically and likely tells the feds where the seeds have been planted reliably. they likely do this after the scuffle with the feds about unlocking phones.
Jonathan Smith
In 2017 When the comet pizza stuff happened anins found a weird video of 2 guys showing how they compressed porn into another image of a cat. So a person looking at the jpeg would see a cat, but another person who had the decompression algorithm could decode it and open the porn.
No I’m just getting ahead of the reaction of normal people. As long as you aren’t promoting we censor our selves out of fear. Carry on.
Hudson Carter
don't tell me how the hivemind works newfaggot. I built it.
Chase James
I just think people have a right not to live in a prison.
Lincoln Nguyen
Okay you are a retard sage
Brayden Phillips
> Abstract:We present a system to hide a full color image inside another of the same size with minimal quality loss to either image. Deep neural networks are simultaneously trained to create the hiding and revealing processes and are designed to specifically work as a pair. The system is trained on images drawn randomly from the ImageNet database, and works well on natural images from a wide variety of sources. Beyond demonstrating the successful application of deep learning to hiding images, we examine how the result is achieved and apply numerous transformations to analyze if image quality in the host and hidden image can be maintained. These transformation range from simple image manipulations to sophisticated machine learning-based adversaries. Two extensions to the basic system are presented that mitigate the possibility of discovering the content of the hidden image. With these extensions, not only can the hidden information be kept secure, but the system can be used to hide even more than a single image. Applications for this technology include image authentication, digital watermarks, finding exact regions of image manipulation, and storing meta-information about image rendering and content ieeexplore.ieee.org/document/8654686
yes im not going to elaborate because I'm not going to make this presentation of information about me, my personality, my ability to convince, or anything. i am anonymous. this is a claim. i dont care what you do with it as long as you are aware of the claim.
Justin Hernandez
If they really really need to, they'll just kill you and say you were resisting arrest.