Your definition of hack differs from most others.It was not at all "hacked".
Your definition of hack differs from most others.It was not at all "hacked".
We chose to use them because we receive a benefit from them. This is just creepy.But there are already algorithms on your iPhone and Mac that have access to your photo library. Why is this one any more susceptible to attack than the existing ones that do things like tag your photos and match faces to names?
Edit: Which BTW don't seem to be able to be turned off.
Leaked PhotosWait - I’m confused by this. Does this mean that everyone’s iCloud is going to be scanned without user’s authorization in the name of child welfare??
While I am sure people may agree with this, it seems like one step away from doctors/dentists submitting DNA samples of *every* patient because it is in the public interest.
This program seems just a small morale slip away from being an invasion of privacy on a monumental scale. Give what Snowden revealed the US government has a huge thirst for data collection like this. It’s a short hop to scan for compromising photos of your political rivals, yes?
You should brush up on your iCloud knowledge. Apple absolutely has access to images in iCloud for anyone using iCloud backup which is NOT e2e encrypted.You should keep giving them the benefit, as you clearly don’t understand how iCloud works. Apple never has access to your images. That’s why the hashing is done on your device, since only your device can view the image.
This. I don’t think enough users are aware of this automatic opt-in, especially whenever you sign out and sign back into iCloud. I have to remember to disable it every time. It’s just stunningly bad that Apple deliberately refuses to remember my last setting.iCloud photos is automatically checked ON when a new device is set up and Apple ID is entered for the first time.
A user has to dig through the settings to manually turn it off.
I still have only skimmed their PDF, but this seems the first time I've heard there's additional matching, and the "Inner-Layer Unwrapping of Vouchers in iCloud" doesn't seem to mention this?
Can I have a citation on this?Most pedos are android users to begin with lol
5 days in and it's hacked. Looks really promising
Well, Tim Cook is a numbers guy and not a product guy.... I could see him saying this saves us so much money if we use phone CPU cycles instead of server CPU cycles, I like it
Fine. Just roll over and give up your 4th amendment protections.
Wait - I’m confused by this. Does this mean that everyone’s iCloud is going to be scanned without user’s authorization in the name of child welfare??
Agreed, though as far as I understand there is a legal obligation to report CSAM when encountered. I think authorities would soon demand that the "pro-user implementation" report positive matches, and Apple could hardly respond that this is technically impossible. Which is why I think no such system should be on the device at all - it crosses a line and it is a beachhead for further surveillance demands.Pro user is using this hash to simply tell a user that the photo is ineligible for icloud upload. Anti-user is secretly viewing the pictures and sending them to the cops
If you meant "even singular false collisions", that's true. A single false collision resulting in a false match being recorded within the safety voucher that accompanies an image uploaded to iCloud Photos will not get reviewed by a human.Does macrumors not bother to verify the claims of others before publishing them? There is no human oversight for reviewing false collisions.
Okay, if you say so.Mr. Green is either misinformed about the specifics or talking about something else. It’s not a surprise that collisions can be found in a hash scheme that specifically seeks to maximize collisions for “similar looking” images. This is not, by design, a cryptographic hash.
People may get technical details wrong, but they get the basics right: Apple is installing an AI-watchdog on your phone, making your own phone look at your data in a way that goes against your interests.I don’t know about you specfically, but people here definitely don’t understand in general, and it’s the same on Reddit. There is so much misinformation about this it’s crazy. So yeah the reason Apple keeps releasing more technical documentation really is because people don’t understand, as I see it.
Perceptual hashes differ from checksum hashes in that they are somewhat reversible - you could recreate an approximation of NCMEC picture if you had its perceptual hash. With a checksum hash even the smallest change in the original should cause a drastic alteration in the hash, whereas perceptual hashing aims to create similar hashes for similar images. That is why Apple encrypts the hashes on the phone, so no-one can jailbreak the phone, extract the database and recreate (blurry/warped) CSAM pictures.They're hashes. Basically checksums. They don't really contain the data, or even a portion of the data; they're a fraction of the size of the data, and all they're good for is you can take the original data and verify a match (or not).
Apple's OSes also contain XProtect, which are hashes of malware — doesn't mean your devices have malware on them.
But what are the statistical chances of a hash collision occurring randomly, 30 times at that, purely by accident and not through deliberate engineering? About as close to zero as anything gets I reckon…With hashing you will always have a chance of collisions because it is inherently lossy by design.
Maybe you should have considered such issues before deciding to carry a multi-sensor tracking device on your person all days every day that provides many more actual mechanisms for depriving you of your liberty than this. Do you have a Facebook account? Instagram? Twitter? Yeeeaaah…Most agree it would not be a problem to find child abuse, the problem is, what's next, this tech can lead to all kinds of finding stuff inside your phone, like politics in countries where you can get into deep trouble venting your opinion.
Wouldn’t it be easier for a hacker to, say, take over your social media account and just start posting bad stuff? The scenarios people are coming up with that make them freak out about this are ludicrous compared to countless other scenarios we already accept without question.I mentioned something similar on a previous thread except the threat I pointed out is what happens if a hacker were able to hijack your Apple ID. Remember a few years ago when there were the celebrity iCloud breaches? Never mind that individuals and account security don't really go hand in hand well (passwords and such).
Previously the worst case scenario was that you lost access to your account and purchases. Now you'll have individuals hijacking accounts and holding people for ransom with the threat of uploading kiddie porn via a VPN in their location in order to frame them which would set off the triggers and as you said... reported to the authorities, no recourse and you'd end up in jail with your life ruined. Doesn't even have to be a hacker, could be a revenge actor doing it, etc.
Apple can preach about the tech being sound till the cows come home, but the mechanism behind it stinks of bad actors, potential criminality, and interference.
Wait - I’m confused by this. Does this mean that everyone’s iCloud is going to be scanned without user’s authorization in the name of child welfare??
While I am sure people may agree with this, it seems like one step away from doctors/dentists submitting DNA samples of *every* patient because it is in the public interest.
This program seems just a small morale slip away from being an invasion of privacy on a monumental scale. Give what Snowden revealed the US government has a huge thirst for data collection like this. It’s a short hop to scan for compromising photos of your political rivals, yes?