• @asdfasdfasdf@lemmy.world
    link
    fedilink
    English
    212 months ago

    What I am find curious about this is if a recovery email would have any weight in court. I can add whatever recovery email I want to an account. It doesn’t have to be mine.

    • @gencha@lemm.ee
      cake
      link
      fedilink
      English
      92 months ago

      I still find it fascinating that you can go to jail because there’s an IP address in a log file somewhere or because of a screenshot of a messenger communication.

        • @gencha@lemm.ee
          cake
          link
          fedilink
          English
          12 months ago

          Definitely. I can just write a log file myself, change the creation date in the filesystem if I have to. There are websites that generate images of DM conversations on a myriad of platforms online. Manipulation of these artifacts is beyond trivial

        • @GamingChairModel@lemmy.world
          link
          fedilink
          English
          02 months ago

          Or, for that matter, surveillance video recordings stored on a server somewhere. It’s all just ones and zeros, but some combinations of ones and zeros are quite informative.

          • ferret
            link
            fedilink
            English
            22 months ago

            As technology progresses it is a fact of life that AI will get better at forgery. Perhaps these items will be less permissible in the future.

            • @GamingChairModel@lemmy.world
              link
              fedilink
              English
              22 months ago

              Forgery is easy. Putting the forged document into the chain of custody is, and has always been, the hard part.

              If we’re talking about financial records, it’s been trivially easy to create fake bank statements, or fraudulently place an old date on a newly created document, or even forge wet signatures, since before computers were invented. But getting that forged document into the filing cabinet of a bank or an accounting firm is the hard part.

              I can make fake IP logs, sure. I can generate fake videos, I guess (under current tech, that takes a ton of effort and skill to be believable). But getting those logs onto Proton’s servers, without Proton knowing? I don’t know about that.