Department for Science, Innovation and Technology’s Post

As internet users, we all have a role in keeping children safe online. If you know a young person in the UK who is worried about their own sexual or nude images, direct them to Report Remove, a safe and confidential removal tool. The young person can receive support from the NSPCC’s Childline, while the Internet Watch Foundation (IWF)’s team create a 'hash', or digital fingerprint, of the criminal image, that is then used to track and remove any uploads of the same image.   Find out more at childline.org.uk/remove

Adam Foxton

ROV Technical Authority

1w

Now THIS is a good service. It's important for victims using this service to note that while an image can be turned into a hash, it's (practically) impossible to turn the hash back into an image. Think of representing an image by counting the total amount of red, green, and blue making up an image. Other images would have different colour-counts, so it is possible to identify this image from a collection, but that colour-count could never be turned into the original image. A hash is like that, but using much more complicated maths to make the match more unique and rebuilding the original even less likely. Below is the SHA-256 hash of the LinkedIn logo. As you can see, no-one's going to be re-creating the image from it. 5c40fb93330c26d04d51d04bcc6e1b21e69e3c2a3fa5cb5fd64e7e8869313aa7

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics