|
Joined: Jan 2006
Posts: 69,417 Likes: 12
Campfire Kahuna
|
OP
Campfire Kahuna
Joined: Jan 2006
Posts: 69,417 Likes: 12 |
This says a lot about how private your phone is. While eliminating child porn is a good thing, where's the constitutionally required search warrant? What else can they be looking for?
Plan to scan iPhones for child sex abuse images draws praise and privacy concerns
By FRANK BAJAK and BARBARA ORTUTAY, Associated Press
Apple has unveiled plans to scan iPhones for images of child sexual abuse. The news has received plaudits from child protection groups, but security researchers have raised some concerns.
Apple unveiled plans to scan U.S. iPhones for images of child sexual abuse, drawing applause from child protection groups but raising concern among some security researchers that the system could be misused, including by governments looking to surveil their citizens.
The tool designed to detected known images of child sexual abuse, called “NeuralHash,” will scan images before they are uploaded to iCloud. If it finds a match, the image will be reviewed by a human. If child pornography is confirmed, the user’s account will be disabled and the National Center for Missing and Exploited Children notified.
Separately, Apple plans to scan users' encrypted messages for sexually explicit content as a child safety measure, which also alarmed privacy advocates.
The detection system will only flag images that are already in the center's database of known child pornography. Parents snapping innocent photos of a child in the bath presumably need not worry. But researchers say the matching tool — which doesn't "see" such images, just mathematical "fingerprints" that represent them — could be put to more nefarious purposes. Apple-iPhone
The Apple logo is displayed on a Mac Pro desktop computer in this May file photo. AP Photo/Mark Lennihan
Matthew Green, a top cryptography researcher at Johns Hopkins University, warned that the system could be used to frame innocent people by sending them seemingly innocuous images designed to trigger matches for child pornography. That could fool Apple's algorithm and alert law enforcement. "Researchers have been able to do this pretty easily," he said of the ability to trick such systems.
Other abuses could include government surveillance of dissidents or protesters. "What happens when the Chinese government says, 'Here is a list of files that we want you to scan for,'" Green asked. "Does Apple say no? I hope they say no, but their technology won't say no."
Tech companies including Microsoft, Google, Facebook and others have for years been sharing digital fingerprints of known child sexual abuse images. Apple has used those to scan user files stored in its iCloud service, which is not as securely encrypted as its on-device data, for child pornography.
Apple has been under government pressure for years to allow for increased surveillance of encrypted data. Coming up with the new security measures required Apple to perform a delicate balancing act between cracking down on the exploitation of children while keeping its high-profile commitment to protecting the privacy of its users.
But a dejected Electronic Frontier Foundation, the online civil liberties pioneer, called Apple's compromise on privacy protections "a shocking about-face for users who have relied on the company's leadership in privacy and security."
Meanwhile, the computer scientist who more than a decade ago invented PhotoDNA, the technology used by law enforcement to identify child pornography online, acknowledged the potential for abuse of Apple's system but said it was far outweighed by the imperative of battling child sexual abuse.
"Is it possible? Of course. But is it something that I'm concerned about? No," said Hany Farid, a researcher at the University of California at Berkeley, who argues that plenty of other programs designed to secure devices from various threats haven't seen "this type of mission creep." For example, WhatsApp provides users with end-to-end encryption to protect their privacy, but also employs a system for detecting malware and warning users not to click on harmful links.
Apple was one of the first major companies to embrace "end-to-end" encryption, in which messages are scrambled so that only their senders and recipients can read them. Law enforcement, however, has long pressured the company for access to that information in order to investigate crimes such as terrorism or child sexual exploitation.
Apple said the latest changes will roll out this year as part of updates to its operating software for iPhones, Macs and Apple Watches.
“In a time of deceit telling the truth is a revolutionary act.” ― George Orwell
It's not over when you lose. It's over when you quit.
|
|
|
|
Joined: Sep 2017
Posts: 4,378
Campfire Tracker
|
Campfire Tracker
Joined: Sep 2017
Posts: 4,378 |
I saw this first hand with my iPhone last week. Nothing related to porn, but I was helping a friend of the wife’s clean out a warehouse and the wife sent me the address in a text or email. A day or two later I was going over to the warehouse and hit my maps icon to put in the address. When I entered like two numbers and the entire address popped up! My phone knows more than I want it to.
My other auto is a .45
The bitterness of poor quality is remembered long after the sweetness of low price has faded from memory
|
|
|
|
Joined: Dec 2020
Posts: 1,992 Likes: 1
Campfire Regular
|
Campfire Regular
Joined: Dec 2020
Posts: 1,992 Likes: 1 |
Absolutely correct!!!
Made in China, and they hate us!
They love our Money!!!
I Learned a long time ago to Separate My Want's from My Needs!
A man's Gotta Do What a Man's Gotta Do!
Know Thy Self!
TRUMP DID WIN!!!
|
|
|
|
Joined: Jan 2016
Posts: 12,059 Likes: 6
Campfire Outfitter
|
Campfire Outfitter
Joined: Jan 2016
Posts: 12,059 Likes: 6 |
I hate that. I don't tolerate porn but I want my phone to be My Phone. We have enough people watching our communications with the Patriot Act.
|
|
|
|
Joined: Apr 2008
Posts: 10,960 Likes: 1
Campfire Outfitter
|
Campfire Outfitter
Joined: Apr 2008
Posts: 10,960 Likes: 1 |
It's pretty scary stuff, who really knows how many companies are listening.
|
|
|
|
Joined: May 2003
Posts: 31,283 Likes: 9
Campfire 'Bwana
|
Campfire 'Bwana
Joined: May 2003
Posts: 31,283 Likes: 9 |
Now you know what the "i" stands for: invade, investigate, and implicate.
So much for the "Just get a MAC and your problems are over" crowd, huh?
Cleverly disguised as a responsible adult.
|
|
|
|
Joined: Dec 2010
Posts: 1,684
Campfire Regular
|
Campfire Regular
Joined: Dec 2010
Posts: 1,684 |
No cell phone is private, it doesn't matter who made it or what it runs.
If it has whipped cream and chocolate drizzles on it, it’s dessert. Grow up and get a coffee damnit
|
|
|
|
Joined: May 2010
Posts: 1,003
Campfire Regular
|
Campfire Regular
Joined: May 2010
Posts: 1,003 |
You guys would have loved the days of the party lines. Remember them well.
|
|
|
|
Joined: Jul 2010
Posts: 2,727
Campfire Regular
|
Campfire Regular
Joined: Jul 2010
Posts: 2,727 |
They’re looking for child abuse.
And probably “white supremacist views!”
Government is like a baby: An alimentary canal with a big appetite at one end and no sense of responsibility at the other. - Ronald Reagan
For why should my freedom be judged by another man's conscience? - 1 Corinthians 10:29
|
|
|
|
Joined: Jan 2006
Posts: 69,417 Likes: 12
Campfire Kahuna
|
OP
Campfire Kahuna
Joined: Jan 2006
Posts: 69,417 Likes: 12 |
They’re looking for child abuse.
And probably “white supremacist views!” The constitution requires a search warrant to look for it on private property which a phone is.
“In a time of deceit telling the truth is a revolutionary act.” ― George Orwell
It's not over when you lose. It's over when you quit.
|
|
|
|
Joined: Dec 2015
Posts: 2,062
Campfire Regular
|
Campfire Regular
Joined: Dec 2015
Posts: 2,062 |
They aren't looking on your phone. They are scanning as it uploads to the iCloud, that's there's, not yours.
Don't want it scanned? Don't synch to the cloud, turn that off
|
|
|
|
Joined: Dec 2010
Posts: 1,684
Campfire Regular
|
Campfire Regular
Joined: Dec 2010
Posts: 1,684 |
"Over the air" is public domain... no warrant needed
If it has whipped cream and chocolate drizzles on it, it’s dessert. Grow up and get a coffee damnit
|
|
|
|
Joined: Sep 2011
Posts: 45,259 Likes: 21
Campfire 'Bwana
|
Campfire 'Bwana
Joined: Sep 2011
Posts: 45,259 Likes: 21 |
They’re looking for child abuse.
And probably “white supremacist views!” The constitution requires a search warrant to look for it on private property which a phone is. My understanding, when I first got a cell phone/smart phone. (Android in my case) The phone may be yours but the operating systems and "apps" are not. You didn't buy them, you just have a license to use them. I heard it's all stated in their "User Agreement", "Terms of Service" or variant thereof.......................... which of course everyone reads thoroughly,...........................................right?
Last edited by Valsdad; 08/07/21.
The desert is a true treasure for him who seeks refuge from men and the evil of men. In it is contentment In it is death and all you seek (Quoted from "The Bleeding of the Stone" Ibrahim Al-Koni)
member of the cabal of dysfunctional squirrels?
|
|
|
|
563 members (204guy, 257man, 1badf350, 257 roberts, 16penny, 58 invisible),
1,937
guests, and
1,115
robots. |
Key:
Admin,
Global Mod,
Mod
|
|
Forums81
Topics1,192,888
Posts18,497,917
Members73,980
|
Most Online11,491 Jul 7th, 2023
|
|
|
|