Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I'm sorry, but WTF? By definition the "cloud" is off-device storage. What reasonable person doesn't know this? You've got to be kidding me with this BS!
It means "not on the device" storage and that is very different than off-device storage. You pay for it with the device, you access it with the device, and you manage it with the device. It's a device feature, powered by an internet connection service to expand the capacity of the device. It is Apple's equivalent of user-upgradable storage.
 
And how are hashes generated? Do you even understand? Or do you just look at Apple's explanation, see the buzzword "hash" and think it's all good?
the hashes are generated from images from the national institute of protecting exploited children. their DB doesnt have IMAGES but hashes.

for example


IMAGE A is one an innocent user took with his dick , sent to his girlfriend, the hash for it is 01ASEFH901JAO for example

IMAGE B is one from NCEMA Database of a mans dick as well, exact same angle, same lighting, same EXIF data, this Image B was taken at same time in the same apartment building in the floor above IMAGE A , It has a Hash of 07B6TF431AFGA

hash scanning will NOT scan for dicks or naked bodies.

It will scan for the HASH, in this case 07B6TF431AFGA


Do you get it now?
 
  • Disagree
Reactions: opfreak
As an alternative... you believe that Cook, Federighi, and other Apple execs on a whim or strong personal beliefs decided to put this system in place all on their own. And felt confident that Apple customers would be just fine with it, with no adverse consequences to the company because privacy isn't that much of a biggie after all?

Really?
And...as if altruistic reasons are good enough to put spyware on millions of iPhones.

The road to hell is paved with good intentions.
 
They get in trouble if they are told about it and don't remove it. If they don't know about it and someone flags it, they are covered by Section 230.

There is literally no legal exposure to Apple if they don't include this spyware in iOS. None.
its only "spyware" if

1. you are ok with CSAM distribution

or

2. You are conspiracy driven and dont trust Apple. Why buy an Apple device? leave the ecosystem
 
the hashes are generated from images from the national institute of protecting exploited children. their DB doesnt have IMAGES but hashes.

for example


IMAGE A is one an innocent user took with his dick , sent to his girlfriend, the hash for it is 01ASEFH901JAO for example

IMAGE B is one from NCEMA Database of a mans dick as well, exact same angle, same lighting, same EXIF data, this Image B was taken at same time in the same apartment building in the floor above IMAGE A , It has a Hash of 07B6TF431AFGA

hash scanning will NOT scan for dicks or naked bodies.

It will scan for the HASH, in this case 07B6TF431AFGA


Do you get it now?
And HOW do they generate the hash? By reading the file.

I am not ok with Apple or any other entity reading the content on my device.
 
  • Like
Reactions: ececlv and BurgDog
You own the physical device - that's it. iOS is licensed to you at Apple's good pleasure, not owned by you.
I disagree. And no one-sided lobbyist is going to convince me that hardware can be sold to me with a different set of terms than the software needed to use it. But this argument that software is somehow special is why people hate the conceited attitude of software developers.

No. As someone who has experience writing firmware, I would say that it is not part of the device in any way whatsoever.
Than the iPhone doesn't do anything they advertise on TV. They need to be sued because the device doesn't even do anything when powered on.
 
  • Like
Reactions: Playfoot
I already did the work of explaining it to you and pointing you in the direction you need to go. Those of us who have been reading them for decades already know this to be true. If nothing else, go back and re-read them from the beginning. It's good history.
Sorry, but you having a hard time pointing to the evidence of your assertions shouldn't fall on me or anyone else. The fact is, you paid for your phone, and it came with an operating system preinstalled that required you to agree to its terms and conditions upon setup. Apple then allows you to install updates, which they pay engineering time for, for free, with the one caveat that you need to again agree to terms and conditions. At the end of the day, you have what you paid for, and it's your choice to accept the free OS update, or not. You don't lose a dime in either case.
 
Sorry, but you having a hard time pointing to the evidence of your assertions shouldn't fall on me or anyone else. The fact is, you paid for your phone, and it came with an operating system preinstalled that required you to agree to its terms and conditions upon setup. Apple then allows you to install updates, which they pay engineering time for, for free, with the one caveat that you need to again agree to terms and conditions. At the end of the day, you have what you paid for, and it's your choice to accept the free OS update, or not. You don't lose a dime in either case.
I lose all the money I already paid for the OS. I really don't understand what you have to gain from disagreeing with these facts. Do you work for apple or some sort of organization with a vested interest in monitoring people?
 
its only "spyware" if

1. you are ok with CSAM distribution

or

2. You are conspiracy driven and dont trust Apple. Why buy an Apple device? leave the ecosystem
That's my plan. I have an iPhone 12 Pro Max. When it's paid for, I'll leave Apple behind.

I'm not going to actively support a company who believes it's acceptable (for any reason) to install spyware on my device. That goes double for a company that makes spyware an intrinsic part of their OS. And it is spyware. Apple is installing software on your device that opens files and reads them. The fact that they're only reading 1's and 0's matters little. They are reading your file.

Being a conspiracy theorist has nothing to do with it. Trusting Apple has nothing to do with it. I can see the potential bad that can come from this. My belief is that far more bad than good will come from it. Many have posted real-world scenarios, so I won't bother. Suffice to say, this is a disastrous decision for privacy.
 
And HOW do they generate the hash? By reading the file.

I am not ok with Apple or any other entity reading the content on my device.
You really ought to not be using whatever device you're using to type these messages. It's reading the contents of everything you do, constantly.
 
You really ought to not be using whatever device you're using to type these messages. It's reading the contents of everything you do, constantly.
Someone help me out here. What's this logical fallacy an example of? I can't remember.
 
And HOW do they generate the hash? By reading the file.

I am not ok with Apple or any other entity reading the content on my device.
It reads the backend of the file not the front end.

So you know every TECH company is scanning the contents of your device. Your email is being read by Google. Your Google Search is being read by Google and shared .

As soon as Apple started to scan on the transition (not when your internet is off) of image hashes towards iCloud, folks get all conspiracy driven when this is perhaps the most secure way of scanning CSAM
 
Than the iPhone doesn't do anything they advertise on TV. They need to be sued because the device doesn't even do anything when powered on.
So Apple pre-installing software onto a device means that it's part of the device itself? Even though the software can be removed or replaced and the device still function? You're making less and less sense.
 
its only "spyware" if

1. you are ok with CSAM distribution

or

2. You are conspiracy driven and dont trust Apple. Why buy an Apple device? leave the ecosystem
If you have nothing to hide can we come over and search your house? If we find nothing, we wont tell anyone anything.

If you are not ok with us searching your house you must be ok with CSAM distribution.
 
I lose all the money I already paid for the OS. I really don't understand what you have to gain from disagreeing with these facts. Do you work for apple or some sort of organization with a vested interest in monitoring people?
How do you lose all the money you paid for the device with the OS you agreed to use when you bought it? To your second question: honestly, I'm between projects, and find this exchange entertaining.
 
  • Haha
Reactions: cupcakes2000
the hashes are generated from images from the national institute of protecting exploited children. their DB doesnt have IMAGES but hashes.

for example


IMAGE A is one an innocent user took with his dick , sent to his girlfriend, the hash for it is 01ASEFH901JAO for example

IMAGE B is one from NCEMA Database of a mans dick as well, exact same angle, same lighting, same EXIF data, this Image B was taken at same time in the same apartment building in the floor above IMAGE A , It has a Hash of 07B6TF431AFGA

hash scanning will NOT scan for dicks or naked bodies.

It will scan for the HASH, in this case 07B6TF431AFGA


Do you get it now?
lol. what an apple apologist. Its not looking for dicks, its just looking for images that have data that looks like kids dicks. And to do so it creates a hash.

Oh wait, you know what. It is looking for dicks. Otherwise it wouldnt work.
 
If you have nothing to hide can we come over and search your house? If we find nothing, we wont tell anyone anything.

If you are not ok with us searching your house you must be ok with CSAM distribution.
arguments don't work if you swing the pendulum all the way to the end. There are only 2 scenarios where anyone would be against CSAM scanning on device


1. If they are OK with the distribution

2. If they believe in the conspiracy that Apple is secretly working with governments to build back doors. Tin foil hat stuff


At that point if its 1. you need help. if its 2. you need help
 
So Apple pre-installing software onto a device means that it's part of the device itself? Even though the software can be removed or replaced and the device still function? You're making less and less sense.
Yes. I also don't have to use the charging cable it came with, but I still own it. I purchased everything in the box, and with it all the updates it is due. The fact that software is even something that can be sold is insane, but since it is, we have to defend our own consumer rights. To many developers, these days seem to want to act like software is somehow different than the cable the device came with.
 
It’s funny how Apple deeply believes that we just don’t understand the feature. I understand the hashes matching process, and I’m against it. Not because of the feature itself (who could be way more intrusive than that) but because of the risk of abuses of that backdoor.
No, it’s pretty clear from your comment that you don’t understand it.

The problem is, all you need after this as a tyranical government is to insert certain hashes as Cp and push them out to tech companies to detect....it's not like Apple is going to verify by looking at that filth.
Have you tried reading the article?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.