Post AzXOi43L5CnEERaViC by kevinmirsky@infosec.exchange
(DIR) More posts by kevinmirsky@infosec.exchange
(DIR) Post #AzXOi43L5CnEERaViC by kevinmirsky@infosec.exchange
2025-10-24T14:47:38Z
0 likes, 0 repeats
So I was reading this article about using the blockchain to host malware by @dangoodin and I had the same question as a commenter: how the hell do you deal with someone putting CSAM on the blockchain???It seems the strategy with malware is tagging it, but that can't seriously be good enough when it comes to CSAM. I don't know much about blockchain tech, but I'm seriously asking about the solution to this.
(DIR) Post #AzXOi5Na9Qa0LW4Bu4 by Suiseiseki@freesoftwareextremist.com
2025-10-24T15:03:15.499414Z
0 likes, 0 repeats
@kevinmirsky @dangoodin The typical method is to ignore it, as nobody will ever see it unless they specifically go looking for it and work out how to decode it.Apparently some degenerate has inserted pizza into the bitcoin blockchain, but I obviously haven't checked myself and such blocks will likely be trimmed on a light wallet.