All police have to do is look up your Ip associated with the pictures..They then can locate you.That part is Pretty easy, "noob hacker" kind of stuff almost anyone could do ... the problem is the sheer number of photo's, Info, and Ip's to sift through is enormous.. Don't help the cops by posting your real name address Ect....(Duh) It's still illegal most everywhere, and they will bust you for it...In some cases even where it is "legal" they will bust you for it... cops make a living doing this with no qualms as to our rights and freedoms vs. their paychecks and bonuses...
One of the best ways to protect yourself if you must post pics is to set up a "Proxy" Google it, learn how to use it, and do post your pics =)
From Wiki
In
computer networks, a
proxy server is a
server (a computer system or an application program) that acts as an intermediary for requests from
clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by
IP address or
protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it '
caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has many potential purposes, including:
- To keep machines behind it anonymous (mainly for security).[1]
- To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]
- To apply access policy to network services or content, e.g. to block undesired sites.
- To log / audit usage, i.e. to provide company employee Internet usage reporting.
- To bypass security/ parental controls.
- To scan transmitted content before delivery for malware.
- To scan outbound content, e.g. for data leak protection.
- To circumvent regional restrictions.
A proxy server that passes requests and replies unmodified is usually called a
gateway or sometimes
tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.