Apple Computer, Apple Juice: Which One’s Better?
So… I just read this story:
Apple unveils plans to scan US iPhones for images of child sex abuse
By Rebecca Klar – 08/05/21 05:22 PM EDT
https://thehill.com/policy/technology/566603-apple-unveils-plans-to-scan-us-iphones-for-images-of-child-sex-abuse
Sounds good, right?
At least, superficially, perhaps.
The second sentence reads in part, “but security researchers and advocates are warning the scanning update — along with one that aims to give parents protective tools in children’s messages — could pose data and security risks beyond the intended purpose.”
But, here’s the creepy part:
“Apple said its method to detect the abusive material is “designed with user privacy in mind.” Instead of scanning images in the cloud, the system performs “on-device matching” using a database of known child sexual abuse material image hashes provided by child safety organizations.”
Did you get that?
“A database of known child sexual abuse material image hashes provided by child safety organizations.”
Now, what follows is a rather simplified version, and quite frankly, it wouldn’t surprise me to know that Law Enforcement authorities are onto that game. But here’s something even more sophisticated: Image hashes.
Here’s a primer on the matter:
https://jenssegers.com/perceptual-image-hashes
It almost does the same thing, albeit with a slight twist – it’s not encrypted.
The technology is called PhotoDNA, was invented by Microsoft, and essentially, works from a known database of child pornographic images, and analyzes them (creates a “hash”) thereby creating a unique digital identifier for each and every image, that is resistant, or impervious to change, such as the elimination of color, or adjustments made using photo editing software/algorithms, including of size, and analyzes each cell/pixel’s intensity gradients, or edges.
But again, it’s based upon ONE premise: An unencrypted file.
Immediately after reading the headline, I saw the flaw.
That flaw is base upon the presumption that customers of Apple’s iCloud service are uploading UNENCRYPTED files.
HOWEVER… PhotoDNA is alleged to work with encryption.
See: https://5rightsfoundation.com/uploads/5rights-briefing-on-e2e-encryption–csam.pdf
In a very simple way, here’s what Read the rest of this entry »