I've mentioned this before to a similar reply. But I'll say it again: this was already publicly known months ago. People just forgot about it because they didn't think it was a big deal. Now that they realize CSAM is a real issue, I made this post to remind everyone about it again. Bad actors already know about this and really, it isn't hard to figure out how this work.
bmygsbvur
Thank you. I did not see this one but it's almost two months old now. This is what I was talking about when I said that it was already a known issue back then. it just isn't being addressed. I hope this post will give more attention to this problem.
This is for public instances.
Yes. This is a great alternative solution.
"Quietly delete the images periodically". If only it was made easier for admins. You can't even report these images because nobody knows it was there in the first place.
Which is why we need to act now.
Doesn't change the fact that this is an issue that needs to be resolved.
You don't need to selfhost to reproduce this. Anyone can do this and that's the problem.
They are stored in the pctrs folder. They don't have file extensions but are viewable with many image programs.
Feel free to open the issue on my behalf. I am not a software developer. You seem to know more about this. I'm just reminding people something that I and many others have observed months ago.
Most admins aren't in the USA. But that's not really the issue here is it?
Entitled attitude? I'm just bringing it up again. It was brought up some time ago but wasn't given attention so I'm bringing it up again after the recent CSAM attacks.
I didn't demand anything in the post. I brought up the issue, explained why it's important, and what admins could do about it.
I don't know how to code but that doesn't mean I'm not allowed to bring this issue to light...