Hackers Found A Way To Bypass Google Security And Watch Porn In YouTube

Hackers have found a simple trick to bypass Google’s stringent policy on hosting sexual and pirated content via its YouTube service. These Internet scoundrels are uploading illegal and inappropriate content to the streaming content provider and YouTube is undergoing a serious crackdown to stop the secret porn and stolen content rush.

A report from website Torrent Freak shares how users are able to trick Google’s high-end Content-ID security system by simply listing uploaded video as “private” content. These unlisted videos are then given direct links with content coming straight from Google’s servers. Typically, Content-ID has checks and balances in place to note what kind of content is going on the site.

While YouTube has a host of pirated videos, albums, and movies, the stashing of porn via the site has seen a recent uptick.

This hosting hack has given a rise to adult sites using Google’s servers to host their illegal content. The direct links grabbed from the uploads are then embedded on other websites, pulling content directly from YouTube on the back end and giving the pirates endless opportunities to stream unbeknownst to Google or, if the content is pirated, the original owners.

Google has been doing its best to take down the adult content as it discovers it but the task is arduous at best. Trying to locate the content has proven difficult and unless original owners say something, the company is unable to identify much of the videos.

No reports or data area available as of yet to determine how likely this hosted pornographic content could show up. If you have kids or otherwise don’t wish to see this type of content up on your various YouTube video watching sessions, there are a number of tips online on browsing safely. Still, due to the nature of this type of security breach, results could be unexpected and random.

Source: yahoo.com

Related posts

Popup Builder Plugin Flaw Exploited To Infect WordPress Sites

Pipidae – the latest malware to take over the Mac ecosystem

Unmasking the Multi-Stage AiTM Phishing and BEC Attack on Financial Institutions