Apple to implement CSAM in the name of stopping child pornography

The #1 community for Gun Owners in Indiana

Member Benefits:

  • Fewer Ads!
  • Discuss all aspects of firearm ownership
  • Discuss anti-gun legislation
  • Buy, sell, and trade in the classified section
  • Chat with Local gun shops, ranges, trainers & other businesses
  • Discover free outdoor shooting areas
  • View up to date on firearm-related events
  • Share photos & video with other members
  • ...and so much more!
  • rooster

    Master
    Rating - 100%
    10   0   0
    Mar 4, 2010
    3,306
    113
    Indianapolis
    Kinda like the patriot act. Hard to argue against something that scans your phone for CP but this article does a good job of explaining to potential for abuse by say a government that wants to target opposition.

     
    Last edited:

    bwframe

    Loneranger
    Site Supporter
    Rating - 100%
    94   0   0
    Feb 11, 2008
    38,193
    113
    Btown Rural
    Going back years, I never could understand how any conservative would support Apple/Tim Cook?

    From RFRA to the modern day, Apple and Tim Cook have hated us. Any gun owner should know better than to support Apple...



     

    rooster

    Master
    Rating - 100%
    10   0   0
    Mar 4, 2010
    3,306
    113
    Indianapolis
    Going back years, I never could understand how any conservative would support Apple/Tim Cook?
    For a long time Apple has been the gold standard in encryption and privacy.

    No I got nothing to hide but I don’t like the idea of some low level analyst a la Snowden potentially having access to my phone.
     

    KLB

    Grandmaster
    Rating - 100%
    5   0   0
    Sep 12, 2011
    23,341
    77
    Porter County
    Going back years, I never could understand how any conservative would support Apple/Tim Cook?

    From RFRA to the modern day, Apple and Tim Cook have hated us. Any gun owner should know better than to support Apple...



    I don't have one, but it isn't like the alternative is any better.
     

    ditcherman

    Grandmaster
    Site Supporter
    Rating - 100%
    22   0   0
    Dec 18, 2018
    7,843
    113
    In the country, hopefully.
    Going back years, I never could understand how any conservative would support Apple/Tim Cook?

    From RFRA to the modern day, Apple and Tim Cook have hated us. Any gun owner should know better than to support Apple...



    Who doesn’t hate us?
    Who is standing up for our rights, as far as tech provider?

    *sent from my iPhone
     

    BehindBlueI's

    Grandmaster
    Rating - 100%
    29   0   0
    Oct 3, 2012
    26,055
    113
    I don't have any Apple products other than an old clicky-wheel ipod that has no connectivity features. Apple stores a lot of data via their iCloud thing. That's billed as a benefit if you lose your phone and need to restore the data to a new phone or the like. However it also means that you don't own a copy of the data. Apple stores it, Apple (mostly) owns it and you agree to it with the terms of service.

    Now, this thing will not "scan" photos. That's driving finishing nails with a sledge hammer. It compares "fingerprints", as explained in the article. That's nothing new and is how copyright striking software works, how LE scans for CP, etc. so it's a little breathless that gov't could suddenly use this "new" technology inappropriately. I'd be shocked if China doesn't already do so.
     

    KLB

    Grandmaster
    Rating - 100%
    5   0   0
    Sep 12, 2011
    23,341
    77
    Porter County
    I don't have any Apple products other than an old clicky-wheel ipod that has no connectivity features. Apple stores a lot of data via their iCloud thing. That's billed as a benefit if you lose your phone and need to restore the data to a new phone or the like. However it also means that you don't own a copy of the data. Apple stores it, Apple (mostly) owns it and you agree to it with the terms of service.

    Now, this thing will not "scan" photos. That's driving finishing nails with a sledge hammer. It compares "fingerprints", as explained in the article. That's nothing new and is how copyright striking software works, how LE scans for CP, etc. so it's a little breathless that gov't could suddenly use this "new" technology inappropriately. I'd be shocked if China doesn't already do so.
    You are a bit off base BBI. The issue is not in the technology that does the scanning. It is in Apple doing it in the first place. It is a small stretch to imagine a government adding fingerprints for things they find subversive.
     

    Leadeye

    Grandmaster
    Rating - 100%
    4   0   0
    Jan 19, 2009
    37,075
    113
    .
    Trying to understand how this works. Apple has a library of kiddie porn that they use to compare other pictures to, looking for similarities?
     

    KLB

    Grandmaster
    Rating - 100%
    5   0   0
    Sep 12, 2011
    23,341
    77
    Porter County
    Trying to understand how this works. Apple has a library of kiddie porn that they use to compare other pictures to, looking for similarities?
    The Government does. Each one has a "fingerprint" which is a way to identify a file without actually opening it. This is how most of your anti-virus software finds viruses.
     

    BehindBlueI's

    Grandmaster
    Rating - 100%
    29   0   0
    Oct 3, 2012
    26,055
    113
    You are a bit off base BBI. The issue is not in the technology that does the scanning. It is in Apple doing it in the first place. It is a small stretch to imagine a government adding fingerprints for things they find subversive.

    I understand that. China already has access to Apple's iCloud database for China. They don't need Apple to scan, they already can do it on their own.

    Governments aren't providing the 'fingerprints', the non-profit National Center for Missing and Exploited Children is. Apple is not reporting to governments, they are reporting to the same non-profit and it's then up to the non-profit to notify LE after "manual verification", by which I assume a human verifies it.

    And this only applies to things on the iCloud, not anything only on your device.
     

    BehindBlueI's

    Grandmaster
    Rating - 100%
    29   0   0
    Oct 3, 2012
    26,055
    113
    Trying to understand how this works. Apple has a library of kiddie porn that they use to compare other pictures to, looking for similarities?

    Not exactly. Computers don't actually send pictures any more than records contain sound. They encode data which is then reconstructed by the receiving computer or by a needle and speaker system, respectively.

    So you have a database with chunks of known "code" that belongs to a CP image. The system then scans for those chunks. It would be like knowing the groove pattern for a few seconds specific to a given record vs knowing what the song is or sounds like. Sort of, that's an oversimplification.

    That's why some videos on YouTube of copyrighted material are mirrored (left changed to right) or music contains a few blank spots. It changes the code/groove the programs look for. The video is basically the same, the code/groove is different. The 'checksum' is what those programs look for, I believe.
     

    Leadeye

    Grandmaster
    Rating - 100%
    4   0   0
    Jan 19, 2009
    37,075
    113
    .
    Not exactly. Computers don't actually send pictures any more than records contain sound. They encode data which is then reconstructed by the receiving computer or by a needle and speaker system, respectively.

    So you have a database with chunks of known "code" that belongs to a CP image. The system then scans for those chunks. It would be like knowing the groove pattern for a few seconds specific to a given record vs knowing what the song is or sounds like. Sort of, that's an oversimplification.

    That's why some videos on YouTube of copyrighted material are mirrored (left changed to right) or music contains a few blank spots. It changes the code/groove the programs look for. The video is basically the same, the code/groove is different.

    I understand that aspect of the transmission of the data, what I can't understand is how you can sort out the differences enough without actually comparing pictures. At the end of the day nobody wants to send the cops to the wrong phone.
     

    BehindBlueI's

    Grandmaster
    Rating - 100%
    29   0   0
    Oct 3, 2012
    26,055
    113
    I understand that aspect of the transmission of the data, what I can't understand is how you can sort out the differences enough without actually comparing pictures. At the end of the day nobody wants to send the cops to the wrong phone.

    Well, humans don't need to compare to a database. If I show you a picture of a tree, you know it's a tree without comparing it to known pictures of trees.

    But here's the truth. LE isn't going to be sent to anyone's phone over a few photos, even if they are obviously CP. CP is so prevalent and resources so limited that very few 'downloaders' are ever pursued. Prolific 'uploaders' are the target.
     

    rooster

    Master
    Rating - 100%
    10   0   0
    Mar 4, 2010
    3,306
    113
    Indianapolis
    Now, this thing will not "scan" photos. That's driving finishing nails with a sledge hammer. It compares "fingerprints", as explained in the article. That's nothing new and is how copyright striking software works, how LE scans for CP, etc. so it's a little breathless that gov't could suddenly use this "new" technology inappropriately. I'd be shocked if China doesn't already do so.
    Ok so the big difference between this and the tech you are talking about is that this is client side. Meaning that the scanning is happening on your iPhone. Yea they claim that it only compares the code of known CP against the code of the photos in your phone but then Apple goes on to say that they can notify you when any photo with nudity gets sent or received on your child’s phone, even if it’s not in the database. This means that they have a machine algorithm scanning photos on your phone. It’s allegedly only turned on on kids phones by the parents.....

    that means that they have broken and put in a backdoor into their own “secure” message program.

    Sure the back door is only open right now for parents allegedly but how long before those communications are just being read by low level analysts and beat cops on a fishing expedition.

    personally I think this is a net loss for Law enforcement. Those that are the real bad guys are gonna be driven further away from mainstream tech and onto more secure systems that can’t be cracked. Osama bin laden used couriers for years to do his business.
     
    Last edited:

    KLB

    Grandmaster
    Rating - 100%
    5   0   0
    Sep 12, 2011
    23,341
    77
    Porter County
    I understand that. China already has access to Apple's iCloud database for China. They don't need Apple to scan, they already can do it on their own.

    Governments aren't providing the 'fingerprints', the non-profit National Center for Missing and Exploited Children is. Apple is not reporting to governments, they are reporting to the same non-profit and it's then up to the non-profit to notify LE after "manual verification", by which I assume a human verifies it.

    And this only applies to things on the iCloud, not anything only on your device.
    Apple says Device:
    Apple repeatedly underscores that its method of detecting CSAM is designed with user privacy in mind. In plain English, Apple is essentially analyzing the images on your device to see if there are any matches against a database of known CSAM images provided by the National Center for Missing and Exploited Children

    Apple explains:

    Before an image is stored in iCloud Photos, an on-device matching process is performed for that image against the unreadable set of known CSAM hashes. This matching process is powered by a cryptographic technology called private set intersection, which determines if there is a match without revealing the result. Private set intersection (PSI) allows Apple to learn if an image hash matches the known CSAM image hashes, without learning anything about image hashes that do not match. PSI also prevents the user from learning whether there was a match.
     
    Top Bottom