this post was submitted on 07 May 2024
519 points (94.4% liked)

Technology

59323 readers
4559 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] asdfasdfasdf@lemmy.world 21 points 6 months ago (3 children)

What I am find curious about this is if a recovery email would have any weight in court. I can add whatever recovery email I want to an account. It doesn't have to be mine.

[–] friend_of_satan@lemmy.world 19 points 6 months ago (1 children)

If your recovery email address is not yet verified, click the Verify now link and then the Send verification email button. You’ll be sent a link to confirm that the email address belongs to you.

https://proton.me/support/set-account-recovery-methods#how-to-add-or-change-a-recovery-email-address

[–] asdfasdfasdf@lemmy.world 4 points 6 months ago

Ah, makes sense.

[–] gencha@lemm.ee 9 points 6 months ago (1 children)

I still find it fascinating that you can go to jail because there's an IP address in a log file somewhere or because of a screenshot of a messenger communication.

[–] lolcatnip@reddthat.com 1 points 6 months ago* (last edited 6 months ago) (2 children)

Any more so than, say, fingerprints, DNA, or accounting records?

[–] gencha@lemm.ee 1 points 6 months ago

Definitely. I can just write a log file myself, change the creation date in the filesystem if I have to. There are websites that generate images of DM conversations on a myriad of platforms online. Manipulation of these artifacts is beyond trivial

[–] GamingChairModel@lemmy.world 0 points 6 months ago (1 children)

Or, for that matter, surveillance video recordings stored on a server somewhere. It's all just ones and zeros, but some combinations of ones and zeros are quite informative.

[–] aBundleOfFerrets@sh.itjust.works 2 points 6 months ago (1 children)

As technology progresses it is a fact of life that AI will get better at forgery. Perhaps these items will be less permissible in the future.

[–] GamingChairModel@lemmy.world 2 points 6 months ago

Forgery is easy. Putting the forged document into the chain of custody is, and has always been, the hard part.

If we're talking about financial records, it's been trivially easy to create fake bank statements, or fraudulently place an old date on a newly created document, or even forge wet signatures, since before computers were invented. But getting that forged document into the filing cabinet of a bank or an accounting firm is the hard part.

I can make fake IP logs, sure. I can generate fake videos, I guess (under current tech, that takes a ton of effort and skill to be believable). But getting those logs onto Proton's servers, without Proton knowing? I don't know about that.