Pages:
Author

Topic: Illegal content in the blockchain - page 4. (Read 23580 times)

hero member
Activity: 616
Merit: 500
Firstbits.com/1fg4i :)
July 21, 2011, 06:10:13 PM
#63
If someone printed kiddyporn in a 100 dollars bill and you got paid with it, do you need to burn your money?
legendary
Activity: 1400
Merit: 1005
July 21, 2011, 06:04:00 PM
#62
The issue is not just storing it unknowingly; for that, it would seem extremely unlikely one could be prosecuted(but IANAL not legal advice etc).  The problem is if you are told you are storing it, you now know it and must delete it.  But it is completely unreasonable to erase bitcoin history, because it is needed for verification.

In other words, this problem won't arise in other contexts because you either don't know about it, or have deleted it.  But here, even if we are told about it, we can't delete it or the whole network breaks.
 
One solution is txs can be blacklisted as bad: nodes won't store them anymore and just reject all TX spending them.  But this will fork the chain.

It might be worth asking EFF about this.
This would open the door to double-spend attacks though.  Pay someone in bitcoins, whilist including the transaction in an illegally encoded data stream, then when you release the key to said illegal content, the transaction is reversed, and you get your coins back.

I don't see any solution to this problem, yet.
sr. member
Activity: 321
Merit: 250
Firstbits: 1gyzhw
July 21, 2011, 06:00:51 PM
#61
I agree with hashcoin, this is an incredibly useful thought experiment and a brilliant attack on the Bitcoin system itself.

So let's ignore the trolly context and get down to the technical details of the attack: Is it possible to encode a small, encrypted jpeg thumbnail in the block chain without mining the block yourself? If so Bitcoin is vulnerable to your run-of-the-mill troll and this should be addressed.

If it's not possible to do unless you actually mined the block, what's from stopping some serious adversary from encoding encrypted child porn into blocks and then releasing the key later on?

What should we do if this happens?
full member
Activity: 372
Merit: 114
July 21, 2011, 05:54:58 PM
#60
The issue is not just storing it unknowingly; for that, it would seem extremely unlikely one could be prosecuted(but IANAL not legal advice etc).  The problem is if you are told you are storing it, you now know it and must delete it.  But it is completely unreasonable to erase bitcoin history, because it is needed for verification.

In other words, this problem won't arise in other contexts because you either don't know about it, or have deleted it.  But here, even if we are told about it, we can't delete it or the whole network breaks.
 
One solution is txs can be blacklisted as bad: nodes won't store them anymore and just reject all TX spending them.  But this will fork the chain.

It might be worth asking EFF about this.
legendary
Activity: 1008
Merit: 1001
Let the chips fall where they may.
July 21, 2011, 05:52:45 PM
#59
Person A decides to sell off his old hard drive. Before he sells it, he makes some "random" data by making a disk image the size of the drive full of kiddie porn and then encrypts it with 20 minutes of 'cat /dev/urandom'.

You lost me here. Isn't /dev/urandom a one-way function?

I recently bought a 500GB hard-drive used. Spent 25 hours overwriting it with /dev/urandom (CPU bound). I then spent 5 hours overwriting with /dev/zero (I/O Bound).

Without the "Key" you can't prove whether something is data or meaningless noise.
member
Activity: 98
Merit: 10
firstbits: 1nathana
July 21, 2011, 04:58:01 PM
#58
Consider this situation:
Person A decides to sell off his old hard drive. Before he sells it, he makes some "random" data by making a disk image the size of the drive full of kiddie porn and then encrypts it with 20 minutes of 'cat /dev/urandom'. After this he then uses 'dd' to copy the raw encrypted data to the drive, effectively wiping his data (assuming the new owner knows nothing beyond foremost, but if he didn't feel secure, he could just do this multiple times with different keys) in the process. Lets also say he only had a 10gb collection of kiddie porn, so he just repeated it 8 times (assuming an 80gb drive). Person A then sells this drive to person B. After only putting 15gb or so on the drive, person B, not knowing deleted files can be recovered easily, just reinstalls windows (using quick format to boot!), and sells the drive to person C, unknowingly having distributed 6 good copies of person A's kiddie porn collection. Then, person C having been a friend to person A, and knowing the key, reports person C for possession and distribution of kiddie porn. Do we charge person B with possession and distribution? Probably not, but in the off chance we do we also have to charge person c, it would be like charging some one with dealing because there was cocaine residue on there dollar bill that they exchanged for bitcoins. If they do charge them, will they case get past a jury? Hell no, there is something called a reasonable doubt that he knew that he was selling the kiddie porn with the drive.

It is pretty much the same thing here folks.
member
Activity: 98
Merit: 10
July 21, 2011, 04:27:15 PM
#57
This thread reminds me of http://www.angio.net/pi/piquery

sr. member
Activity: 308
Merit: 250
July 21, 2011, 04:22:08 PM
#56
How are you going to prove your own 'ignorance'?  Prove the non-existence of your knowledge.  Good luck with that.

Criminal justice: You're doing it wrong.
hero member
Activity: 616
Merit: 500
Firstbits.com/1fg4i :)
July 21, 2011, 03:59:57 PM
#55
Thanx 4 the gr8 reply gnaget.Saved me a lot of worry.and yes I find that trolls are really annoying.They spread crap (info) everywhere and they confuse people (like me as well).Then they wonder why we get so pissed off with them.(Serves them right too)
They don't wonder why people get pissed at them, they know it; it's because they made them get pissed at them, that is their goal from the start...
hero member
Activity: 616
Merit: 500
Firstbits.com/1fg4i :)
July 21, 2011, 03:56:58 PM
#54
(.)Y(.)   <----  My password. 

I'm storing pron on every website I log into!

edit: oh dam...now everyone knows my password....


Only in unsafe sites; sites that do it right don't store your password, they store a salted hash.
legendary
Activity: 1022
Merit: 1000
Freelance videographer
July 21, 2011, 03:14:33 PM
#53
Thanx 4 the gr8 reply gnaget.Saved me a lot of worry.and yes I find that trolls are really annoying.They spread crap (info) everywhere and they confuse people (like me as well).Then they wonder why we get so pissed off with them.(Serves them right too)
full member
Activity: 154
Merit: 102
July 21, 2011, 02:57:39 PM
#52
Quote
1.how do you find or 'sniff' the 'illegal' data from a block chain?
I guess the easiest way is to encode data in the amounts or in the addresses.  The amounts would cost more, but the addresses would cost more cpu.  Either way it is only an intellectual exercise

Quote
2.How can running a BTC client (or miner) cause legal issues for me?
It can't

Quote
3.Is this a big problem?or something I can ignore (for a bit)?
It's irrelevant, OP is only a troll, or completely delusional if he actually means this as a threat

Quote
4.What legal issues can this cause me? and can they be serious?
None

Quote
5.How can law enforcement and the like reconstruct the file,trace it back to you and throw u in da slammer?
If they know how data is encoded, it can be decoded. 

Quote
Thanks
You're welcome
legendary
Activity: 1022
Merit: 1000
Freelance videographer
July 21, 2011, 02:43:38 PM
#51
Wait a minute man.How can you be so damn sure that blockchains can hold 'illegal' content that can throw me in jail?I don't understand much about cryptography or code cracking but what ind of 'illegal' data are we talking about here.The odd stray bits? or something bigger than that?

I'd love to know how UK law handles this as Im based in UK.If anyone knows please tell me.

I've got these questions for you:
1.how do you find or 'sniff' the 'illegal' data from a block chain?
2.How can running a BTC client (or miner) cause legal issues for me?
3.Is this a big problem?or something I can ignore (for a bit)?
4.What legal issues can this cause me? and can they be serious?
5.How can law enforcement and the like reconstruct the file,trace it back to you and throw u in da slammer?

Thanks
full member
Activity: 143
Merit: 100
July 21, 2011, 02:19:37 PM
#50
To OP,
Please remove the word 'Thai' from your name.
It is a disgrace to my country.
hero member
Activity: 532
Merit: 500
FIAT LIBERTAS RVAT CAELVM
July 21, 2011, 10:21:52 AM
#49
Someone should write a program that interprets random chunks of the blockchain as bitmap data, and see what pops out.
This sounds like the Bible Code. If you take a large pseudo-random data source, apply thousands of analysis functions over it, and apply a liberal dose of interpretation to the results, you'll undoubtedly end up with "meaningful data". It's like Rorschach blobs.

I suspect if you make images out of the block chain data, you'll probably find at least 4 or 5 vaguely plausible pictures. The problem is finding them amongst the 10 million random noise pictures.


And in the meantime, You get a nice screensaver with random colors and shapes
newbie
Activity: 27
Merit: 0
July 21, 2011, 09:43:31 AM
#48
Someone should write a program that interprets random chunks of the blockchain as bitmap data, and see what pops out.
This sounds like the Bible Code. If you take a large pseudo-random data source, apply thousands of analysis functions over it, and apply a liberal dose of interpretation to the results, you'll undoubtedly end up with "meaningful data". It's like Rorschach blobs.

I suspect if you make images out of the block chain data, you'll probably find at least 4 or 5 vaguely plausible pictures. The problem is finding them amongst the 10 million random noise pictures.
legendary
Activity: 966
Merit: 1009
July 21, 2011, 07:31:12 AM
#47
To make the example more clear:
1. Let X = illegal file
2. Let Y = completely random bitstring of same length as X
3. Let Z = X xor Y
4. Post Y on one server, say a google blog.  Post Z on another, say a wordpress blog.

Now observe the following: Y is a totally random string, so clearly it contains no information about X.  What about Z?  Well think about it: if I take some fixed string X and XOR it with a totally random string, what do I get?  I get another totally random string.  So Z is also a totally random string, containing no information about X either.

So now we have two servers both storing totally random strings.  Clearly, neither is illegal alone.  But their XOR is illegal.  Who commited a crime, other than the uploader?
Does either of them have a purpose other than being able to be recombined to reconstruct the original illegal file? If not, what's to stop the courts from ordering both to be removed? (Obviously if one of them does have a purpose other than being able to be used to reconstruct the illegal file, the other one must contain the information about said illegal file; due to the way the two files have to be constructed it's impossible for both of them to have been created for another purpose.)
They could both have another purpose.

Let P = Public domain file 1
Let Q = Public domain file 2
Let R = Y xor P
Let S = Z xor Q

Host R and S on other separate websites.


Now we have the situation where Y and Z have a legitimate purpose, since...

Y xor R produces P
Z xor S produces Q
hero member
Activity: 686
Merit: 564
July 21, 2011, 06:50:50 AM
#46
To make the example more clear:
1. Let X = illegal file
2. Let Y = completely random bitstring of same length as X
3. Let Z = X xor Y
4. Post Y on one server, say a google blog.  Post Z on another, say a wordpress blog.

Now observe the following: Y is a totally random string, so clearly it contains no information about X.  What about Z?  Well think about it: if I take some fixed string X and XOR it with a totally random string, what do I get?  I get another totally random string.  So Z is also a totally random string, containing no information about X either.

So now we have two servers both storing totally random strings.  Clearly, neither is illegal alone.  But their XOR is illegal.  Who commited a crime, other than the uploader?
Does either of them have a purpose other than being able to be recombined to reconstruct the original illegal file? If not, what's to stop the courts from ordering both to be removed? (Obviously if one of them does have a purpose other than being able to be used to reconstruct the illegal file, the other one must contain the information about said illegal file; due to the way the two files have to be constructed it's impossible for both of them to have been created for another purpose.)
legendary
Activity: 1582
Merit: 1002
July 21, 2011, 06:38:39 AM
#45
In most countries prosecutor must prove that you was acting illegally (i.e. knew that property was stolen). This is almost impossible, so it is very, very rare when reseller of stolen goods get imprisoned.

There is flea market in Riga, anyone knows that vast majority of goods selling there are stolen (auto radios, cell phones, bicycles etc.). But I can't mention even one person who was imprisoned for this activity. Police regularly make raids, but just confiscate items that legitimate owner described or told serial number.
member
Activity: 84
Merit: 10
July 21, 2011, 02:43:32 AM
#44
you do know that you get convicted if some website loads some child porn in some invisible iframe without you knowing if the cops can find it in your browser cache? Or, to take it somewhere offline, that you get convicted if you buy something off ebay and when you try to register it to your name and it happens to come out that it was stolen.
You do know that in most jurisdictions, receiving stolen property requires the keyword: "knowingly"?

How are you going to prove your own 'ignorance'?  Prove the non-existence of your knowledge.  Good luck with that.

All it takes is some prosecutor who thinks he can convincingly prove that you did 'know' to cause a lot of trouble for you (even if you ultimately win).
Pages:
Jump to: