Feeds

How to strip pesky copyright watermarks from photos ... says a FACEBOOK photo bod

Engineer kills step-by-step instructions to steal pics online

Choosing a cloud hosting partner with confidence

A Facebook software engineer who published a detailed guide to stealing photographs online – by explaining how to remove watermarks and ignore any copyright restrictions – has been shamed into removing the blog post.

It's unclear if Jesse Chen still has a future at Facebook. The company, when quizzed by The Register, declined to comment.

As first spotted by Peta Pixel, Chen, along with his chum Jonathan Tien, had laid out – in a step-by-step "tutorial" on his personal blog – how freshly graduated students could get their hands on free snaps of their graduation day.

Typically, graduates have to pay for photos taken of them in their funny hats and hoods during their graduation ceremonies – and are shown heavily watermarked previews of the images before they buy copies of the originals on the web.

Chen's blog post, titled "freeing your online graduation pictures", explained how to strip off the watermarking.

The article was apparently deleted by Chen himself, but it is still available via Google's cache.

Chen, whose LinkedIn profile is here, brashly wrote:

Congrats new grad. Now that graduation is over, photo proofs have been sent to you online for you to view. The only problem is, you can’t seem to save those pictures! Right clicking on the website seems to be disabled and you really want to see and share the images without that ugly copyright overlay or the proof watermark right in the middle of the picture.

Don’t worry. In this article, my buddy Jonathan Tien and I partnered up to teach you how to grab the image off the website, and use Photoshop to remove the proof watermark from the image.

He went on to explain the exact method for effectively stealing the images from the copyright holder and then using "Photoshop magic" to remove "the disgusting yellow proof watermark".

"Of course, it’ll never stand up to close scrutiny, but it’ll pass if you need something quick and dirty," Chen added. "And of course, you can always make things less obvious by applying filters (Instagram, anyone?) or blurring the [sic] a duplicate layer and performing an overlay, adjusting brightness/contrast, etc."

Chen signed off with a claim that surely goes against how Facebook views photo ownership, right?

We hope that this tutorial helps you by freeing your graduation pictures so that you can take back what’s yours to begin with.

Really, Chen? Are you sure about that? ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?