If I take an illegal file like a cp video and flip all it's bits, is the new unusable file still illegal?

If I take an illegal file like a cp video and flip all it's bits, is the new unusable file still illegal?

Other urls found in this thread:

jeffreythompson.org/every-possible-photograph.php
en.wikipedia.org/wiki/Illegal_prime
en.wikipedia.org/wiki/Drug_policy_of_Portugal
twitter.com/SFWRedditGifs

better question is, at what resolution does it become illegal?

It becomes an encoding of an illegal file.
Which is illegal.

What if I invent my own method to modify the bits and don't call it encoding?

I bet you can take some random file and develop an algorithm to make it an encoding of another random file. At what point does a license agreement become an illegal encoding of cp?

>electrical generated pixels are illegal

oh, 2017

That's no different than encryption.

jeffreythompson.org/every-possible-photograph.php

That's called tampering with evidence and a serious felony, you degenerate kiddie fiddler.

Since when are encrypted files illegal?

I thought about doing this but knew it would be unfeasible in the amount of time it would take, even if you only used 256 colors and skipped blank screens and such.

So it also makes it illegal to have a HDD/SSD which once had CP stored on it

>At what resolution does it become illegal

This is actually already defined. I forget the exact numbers and I'm unable to find a specific source, but it's much. much smaller than Sup Forums thumbnails. Something like 100x100

Then you can post 100x100 cp image on here right now legally?

Or create multiple crops of one image and post them separately.

So can I crop a cp image into several 100x100 images and post each separately?

>certain combinations of atoms are illegal
It's not fucking fair

Most places encryption itself isn't illegal, but encrypting illegal content doesn't make it not illegal content. If anything, it could worsen the charges compared to unencrypted versions of the same illegal content, since encrypting it is a sign that you KNEW what you were doing was illegal, so you can't claim ignorance of the law.

no, they could find a way to charge you if they wanted

You could use simulated annealing and your own input to make cp, like
>oh yeah that bit of noise there looks like an underage pussy
and then the algorithm would descend the error surface making it a clearer image each time then asking for your input again and so on.

>Certain bioelectrical impulses are illegal
Well, shit.

by definition that is an encoding

i knew someone who's ex dobbed him into the queensland police service for cp

they prosecuted him for thumnails in a browser cache

>I can't agree to this eula and I'm reporting it as cp. Have fun in the pokey, microsoft.

>oh yeah that bit of noise there looks like an underage pussy

kek

Some guy at the Bestbuy I work at got arrested for CP but still comes into work. Not everyone knows he got arrested for it but I stay far away. Like why still come into work, man.

this is why
I can't wait for the entire internet to be encrypted.

tfw you create a cp image out of random bytes

The cp file of Theseus.

No you fucking idiots. Bit flipping/reversing is literally a form of cryptography. It is a reversible effect.
They are going to detect that if they run data analysis on the file fucking immediately.

en.wikipedia.org/wiki/Illegal_prime

Browser cache shouldn't be enough

Depends on the country, in the US court ruled once that it didn't count, because a browser cache doesn't constitute as owning content.

>They are going to detect that if they run data analysis on the file fucking immediately.
Of course they are you idiot, the point of the thought experiment is "Where does the boundary lie? How many layers of manipulation can it go through before it's no longer illegal? What if it's given to someone who doesn't know the encryption/manipulation used, is it still illegal? Would the series of vim keystrokes used to type out the hex representation of the file also be illegal? If you could develop an AI that could find an algorithmic mapping between any two pieces of data, could you make any piece of data illegal CP by publishing the algorithm necessary to convert it into such?". That sort of thing.

If it can be proven to be a probable container for CP, then yes.
If the hash matches that of a known cp container, or something.

But of you are under investigation, and they know you download the file. They will take any encrypted content and classify it as encrypted cp, and data destruction/hiding.
If you can prove it otherwise, if they let you, then you will be in a better situation.

Not the guy you're arguing with but maybe if you're curious about the law you should actually read the law.

What if someone makes a one-time pad to turn the contents of your hard drive into cp? That means you have illegal encrypted content on your hard drive.

Why would it matter when you already took the file? They wouldn't even have to charge you based on the latter if you downloaded an illegal file you mongo.

my guess is that if the data is /known to be reversable/ back to the original illegal data, then it's still illegal
that is, if you have data which you know can be reversed to illegal data, then you're still in posession of illegal data, just in an obfuscated form
i'm not sure what can be said for posessing data which you do not know is reversable to something illegal, but is. i suppose that would count as "plausable deniability", but i'm not a lawyer

ps. the former doesn't need to be encryption, either
even something as simple as placing a file in a compressed archive like rar/zip/7z, alteres the data so it no longer directly resembles the original data

wait

if you encrypt your legit data with a one time pad key comprised of CP, is your encrypted data illegal? is it a derivative work? is it illegal to decrypt your data?

>fill all the bits of cp
>pc
>politically correct
Nope, you're fine

>even the cop gets in trouble

What if you had a program that re arranges the pixles in any image to resemble cp

this is actually the start of a good question. let me point out some things

1. encrypting illegal content and then losing the key is not effectively different from deleting the content and overwriting it with random bits
2. with some restrictions, for any given file there exists a decryption method and key that decrypts it into an illegal file of smaller size

the moral is that common law is nonsense when applied to computers

the mask that combines with the original image to turn it into CP is basically a one time pad

>procedural cp generator
I'll design the logo

oh, it's not clear to me whether that one time pad itself would be illegal
it alone is not reversable

actually no, i guess it would be
regular encryption isn't reversable without both the data and the key, and that's been shown to still be illegal

>that is, if you have data which you know can be reversed to illegal data, then you're still in posession of illegal data, just in an obfuscated form
That would be absurd. I could make a version of the Linux kernel illegal by producing an algorithm that would turn it into a CP image. The publicity of such a declaration would surely draw the attention of a significant number of users of that version, who would then be aware they had the means to produce CP. I could even probably structure it such that the algorithm was significantly smaller than the kernel, making the kernel the "main component".

>encrypting illegal content and then losing the key is not effectively different from deleting the content and overwriting it with random bits
Which raises the question, at what level of difficulty does it become illegal? If I use an older encryption standard that could be broken by a large distributed network in a few days, does that qualify? Weeks? Months? At what point is it considered unreasonably difficult? It doesn't even have to be encryption, would a CP generating neural network be less illegal if it took 100 years on a desktop computer to churn out the result?

gonna throw some scenarios out there for thought. lets say some chinese spy wants to fuck with some average nobodies.

1. uses ancient chinese magic to hack and upload encypted illegal content via internet. content is left encypted but easy to break

2. does above but leaves a password.txt in same directory as encrypted file

3. gains access to target via lan exploit. drops payload and also installs service/script to spoof users browser and send some incriminating search terms to Google in the background

4. chinahacker gives user usb drive and says "hey, check out my game" and user installs. game is chinese botnet and does the same as 3.

When its fbi party van time, exactly how does the normie defend themselves in court on any of this? Just how fucked are they?

I realize the level of paranoia these scenarios suggest.

Framing is a real issue. Societyhas plenty of trust that your neighbour won't do something bad to you.

Enough planning and you could get someone arrested for drugs/cp. This is why it's important to protect your router.

>how does the normie defend themselves in court on any of this
They don't, this is a very real risk. Even somebody very skilled with computers would likely be unable to defend themselves in court. A good attack could enter months in advance, and sit there making illegal searches (possibly after waiting a while to make the connection between it's installation and the attack less obvious), before cleaning itself up and calling the cops.

If the attack was executed near perfectly the only thing that might save you would be if you were using an SSD. It's functionally impossible to erase data from an SSD from software (it's lost eventually, but for the most part you can't say "Hey, this file, get rid of it now"), so unless they waited a long time before calling the cops, there would likely be traces of the virus lying around on the flash chips. I don't know enough about the legal system to know what your chances of being able to say "Hold on while we reverse engineer chunks of an unknown binary program we found on the flash chips in case it's a virus" are.

Having thought about it more, backups would also help. If you had multiple images of the disk, you could probably find the binary from before it was deleted and if the virus was faking file timestamps you could potentially cast doubt over the entire thing by proving those wrong.

Wouldn't it be easier to just legalise love?

>certain combinations of atoms are illegal
This is wrong.It should be
>Certain combinations of atomic states are illegal

...

Legalizing "love" is neither desirable (for hopefully obvious reasons involving the wellbeing of children) nor necessary. You can legalize the possession of child pornography without legalizing producing it or fucking children, which would get rid of this "illegal algorithms, numbers and data" nonsense, while keeping "doing shitty things to kids" illegal.
(For the smart ass in my immediate future, yes I do realize that legalizing child pornography would probably cause production to skyrocket thus harming more children, I'm not at all convinced it's a good idea, just that it might be worth considering).

Would a decentralized internet make it easier to get away with watching cp and other illegal stuff??

I just read up on blockchain technology and ethereum desu

As a society we have decided that there are some mathematical equations so terrible that someone possessing them needs to be locked away and scorned.

>Would a decentralized internet make it easier to get away with watching cp and other illegal stuff??
If you use an encrypted routing protocol that means no one link in the chain has all the information, absolutely. That's basically how Tor makes it easier.

Consider, A wants to send an illegal meme to D.
A encrypts it so that only D can open it and picks out a route it should take. A sends it to B, who decrypts a header on the message saying what the next node is and sends it to C, who decrypts another header and finds out that they should send it to D.

If you build this properly, the following statements are true:

A knows what the message was and who it was sent to, but that's a fundamental feature of communication.
B technically knows where the message came from, but they don't know for sure that that was the source or just another link in the chain.
C technically knows where the message is going, but they don't know for sure that's the destination and not just another link in the chain.
D knows what the message is and depending on whether or not A wants to divulge that information, may or may not know who sent it.

Nobody except for the sender and receiver can read the actual message text and even though they may "know who the other end is" that information can be quite harmless. For example knowing the Onion URL of a drug marketplace is no help at all in finding the geographical location of the server hosting it, or anything else about the owners.

I've always wondered why everyone is so uncreative with hiding their high value files? Why can't you just zip up your shit with a password, change zip to bsp, stick them in a pak archive and pretend it's a Quake map, and be on your merry way through the airport with your laptop or hard drive? If you want to take it further, pack the game up into a game installer. You don't even need to encrypt shit lol. Can this be done?

And adding to this, why can't you change your file's extension to .cfg, .ini or some shit and sync that file through Steam Cloud and retrieve it on the other hand? Or embed it in some shitty Razer onboard firmware and no one will suspect a fucking mouse.

Spies do this and more.

>I've always wondered why everyone is so uncreative with hiding their high value files? Why can't you just zip up your shit with a password, change zip to bsp, stick them in a pak archive and pretend it's a Quake map, and be on your merry way through the airport with your laptop or hard drive?

>Scenario 1: You're going through an airport and you don't want people digging through your shit
In this scenario it's a pointless waste of time. Yes they're unlikely to notice this tactic if you do it well enough, but you could also just wipe or mostly wipe the device and recover the files once you're over the border via encrypted download.

>Scenario 2: Your shit has been seized by law enforcement
In this scenario they will apparently find it, how I'm not entirely sure, but they have far more time available to them so I wouldn't be surprised. A much better answer here is to use an encrypted filesystem, or if you live in a country with mandatory key disclosure, a deniably encrypted filesystem. Software specifically designed to be deniable is likely to be far more resistant to data analysis than any series of obfuscating transformations you apply to it by hand.

>Bonus scenario: You actually need to access it
I would be willing to bet that the majority of the people who get caught with say, CP, get caught with it basically open. If you're a big enough piece of shit to be downloading and storing CP, you're almost certainly masturbating to it on a regular basis, in which case you don't want to dig it out of your obfuscation every time you wanna whack one out.

In conclusion, there just isn't really a use case where it's a worthwhile thing to do. There are simpler and/or more secure answers in most scenarios.

All my ideas were assuming you had to take the data across a security checkpoint, like say an airport, not necessarily just file hoarding at home and you want to whack one out. Yes, this would be really tedious if you intend to use it. I hope Carmack won't get into trouble for assisting with hiding "personal files".

This is interesting actually

I thought I was in n4c for a moment while reading this thread.

Taking valuable data across a border is pointlessly dangerous no matter how well you hide it when the Internet is readily available and allows unrestricted encrypted streams to be sent across borders with absolutely no questions asked.

>not actually embedding hidden CP (visible from only a single vantage point in noclip) in your Quake maps
>2003

>pi contains all combinations of numbers thus contains cp that can be accessed with pifs
>pi isn't illegal
What did they mean by this?

>contains all combinations of numbers
It's a hypothesis yet to be proven.

>but they have far more time available to them
The police here spent 14 months cracking an encrypted HD containing abuse vids of the owner's young daughter.

>make loop that just adds 1 to a number
>will eventually generate everything ever
>loops aren't illegal
What did they mean by this?

Portugal did it with drugs. There used to be a huge crackdown then they said fuck it and did a complete 180: free needles at pharmacies with an info-pamphlet about where they could get treatment for their addiction (i.e. less powerful drugs to wean off the heavy stuff in health centers)
en.wikipedia.org/wiki/Drug_policy_of_Portugal

CP is different though, because it doesn't hurt the user, it requires that someone else gets hurt for the pleasure of the user

cons:
>more CP will be produced
>might incentivize / awaken latent pedophilia

pros:
>no censorship forever (requires that owning, sharing, distributing all become legal)
>more availability = less actual child abuse (just like more porn = more virgins)*
>child abuse is still illegal, obviously
>people can be given help to treat their addiction, rather than jailtime

*is this true? What do you think?

New argument: it's illegal to kill people, it's not illegal to watch, own, distribute videos of people getting killed

>r3ddit WILL defend tihs

It's only the people who don't do this who get caught

>using .zip
>not using prime based compression

haha nigga u dumb ?

pedos were awake before video recording existed

Is there actually a law about this or specific court case?

Instead of reading a fucking Wikipedia article, you need to actually look at real statistics of the drug effect on Portugal.

Love should be legal as it doesn't hurt anybody. It was legal in America up until the 20th century and it didn't hurt anyone.

If it didn't then it would be a rational number.

>>more CP will be produced

Why?

Didn't the music industry say free downloads will kill their business model? If everyone starts downloading CP won't it also kill the CP industry?

yes, what matters is where the data came from, can it be reconstructed to the original and intent.

>Didn't the music industry say free downloads will kill their business model? If everyone starts downloading CP won't it also kill the CP industry?

>normie
It's normalfag, lebbit.
Important issues aside, they don't. That is why the mere possession of something being illegal is bad. It's not too difficult to frame someone. Just toss a flash drive or memory card into their bag, purse, backpack.

>New argument: it's illegal to kill people, it's not illegal to watch, own, distribute videos of people getting killed
It is if it is intended for sexual or sadistic pleasure, at least that's the case in my country.

Only if you don't support good cp by getting a crunchy pizzaroll subscription (only 6.95$/month) :^)

>illegal searches
what did he mean by this?

>60203107
In the US, pretty much every time you touch a computer you are violating some sort of federal law, it's just a matter of doing something that pisses off a US attorney enough to go after you.

Raping sexually unaware individuals whom cannot comprehend the consequences of sexual intercourse is not love, its child abuse. I recommend killing yourself, fucking parasyte.

The fact that you had iny our possesion those files is a crime

>it used to be legal and it didn't hurt anyone.
Citation needed.

anyone who has passed puberty should be aware of the basics of sex
are you saying it should also be illegal to fuck severely uneducated and/or retarded (not jokingly) people? they're more likely to be less capable of deciding to have sex than a normal 14 year old

>are you saying it should also be illegal to fuck severely uneducated and/or retarded (not jokingly) people?
It is already very illegal to fuck the mentally retarded, you dimwit. It is considered rape.

lol wat.
I wonder if that would work for binary files.
I know many file storage systems over the years have never checked for binary data when they only wanted textual.

Unluckily I hate Steam enough that I cannot be bothered to start it and try it out.

You'd think any "normally functioning" adult would be capable of making informed consent on sexual topics.
But facts are, they are not.
If they were, they'd also not be in 20 kinds of debt, be in a shit job with no education and 15 kids.
Most adults are fucking retards by any reasonable metric.

What exactly are the consequences of sexual intercourse?

That would require storing readable texture material into the quake map file, even if you can only 'read' it by being in the game and being in a certain place in the engine. Point is: If the engine can read it, so can the feds.

You'll destroy the person having sex because society will demonize them, then make them think they did a dirty thing.
I remember sex before marriage used to be the norm and anyone outside of that killed.

Personally I am for banning everyone by default until they can prove they are capable of informed consent via test.
If they are unable to, they are banned from retest for a year. Equally banned from ANY adult interactions, services or products.

There are so many adults incapable of informed consent they get abused every day by banks, stores, supermarkets, car dealerships, fast-food and a million other facets of society.