| ▲ | amiga386 4 hours ago | |||||||||||||
False flag attacks are a thing that wannabe censors do. They post CSAM to some service/site, then immediately report it to every possible contact of the site's hosting provider, DNS provider, DDoS protection provider, etc. But not the site itself. Before they do that, they spend weeks probing the site's moderation response, to work out the best time to evade detection on the site itself. Then they do it again, and again, and again. They fight against the site's attempt to block them. Their intent is to _deliberately_ get the site into trouble, and ultimately get the site's hosting, DNS, peering, etc. to abandon it. The same sort of shitstains also persistently DDoS the site. Why do they do it? Usually minor and petty internet squabbles, the instigator hates the site and wants to destroy the site, and uses these underhand tactics to do it. They have no legal way to get what they want -- destroy someone else's site for their own pleasure -- so they use illegal ways. https://protectthestack.org/ | ||||||||||||||
| ▲ | bee_rider 3 hours ago | parent [-] | |||||||||||||
I don’t understand this attack, are these reports anonymous or something? In order to pull off this attack the attacker would have to have a collection of CSAM to upload. What if the site being attacked logged the uploader’s IP and went above-and-beyond complying with authorities and provided the source of the upload. Well, I guess some people doing this sort of thing would try to hide their identity while doing the upload. Honestly, in that case… it might be reasonable for sites to not accept uploads via things like TOR, right? (Or however else these people hide their tracks). | ||||||||||||||
| ||||||||||||||