▲ | bawolff 5 days ago | |||||||||||||||||||||||||
Having the threat of lawsuits is not really about the actual lawsuit, its about scaring people into being more careful. If you actually get to the lawsuit stage, the strategy has failed. > We can reduce the latency of discovery and resolution by adding software protocols. Can we? What does this even mean? [Edit: i guess you mean the things in your parent comment about requiring including some sort of canary token in the DB. I'm skeptical about that as it assumes certain db structure and is difficult to verify compliance. More importantly i don't really see how it would have stopped this specific situation. It seems like the leak was published to 4chan pretty immediately. More generally how do you discover if the token is leaked, in general? Its not like the hackers are going to self-report.] | ||||||||||||||||||||||||||
▲ | tonymet 5 days ago | parent [-] | |||||||||||||||||||||||||
The signatures would appear in the drop . A primitive version would be file meta data or jfif. Even the images themselves or steganography could be used | ||||||||||||||||||||||||||
|