Hey Tim, remember when you issued a public letter of apology for the steaming pile that was Apple Maps in 2012?
Yeah, it's about that time now again.
Yeah, it's about that time now again.
No what you’re talking about his procedure not capability. The 30 matches or what hashes are procedure. The problem is and I think I’ve stated it before is this procedure does not limit capability. There’s nothing hardcoded that would stop Apple from changing this to one match or changing what they’re looking for. Do you really not understand this?And yet- it’s not an open ended search. It’s a hash match. Unless that matches they’re not looking at anything at all. And if that matches there has to be a further 29 matches for them to physically look at something, and then it’s only the 30 matches. So still not anything close to having your house searched.
*Disclaimer: I’m talking talking about facts and in relation to what we know. Not hysteria or emotion generated by internet rumours *
The only reason people got upset about Huawei is their connections with the Chinese government. The problem is Apple will do anything the Chinese government tells them to do when it comes to iPhones in China.I'm currently conversing on-line, in real time, with a Russian tech geek colleague (of sorts), on IRC (Internet Relay Chat). In response to this whole brouhaha, he asked "Remember Huawei?" Good point. I wonder how many of Apple's defenders would be putting-forth similar defenses if it'd been Huawei announcing they were doing a similar thing?
Which leads me to another point: Anybody else notice the deafening silence on this issue from the U.S. and other governments?
Yes I do understand that.No what you’re talking about his procedure not capability. The 30 matches or what hashes are procedure. The problem is and I think I’ve stated it before is this procedure does not limit capability. There’s nothing hardcoded that would stop Apple from changing this to one match or changing what they’re looking for. Do you really not understand this?
*Disclaimer: I’m talking talking about facts and in relation to what we know. Not hysteria or emotion generated by internet rumours *
You’re talking about the facts you want to talk about. How about the facts you said you understand? What is your thought on those facts?Yes I do understand that.
Do you not understand this?
indeed, it seems a relatively simple calculation to assume that apple wouldn’t advertise the search threshold if they really want to catch child abuse predators, why shouldn’t one photo be plenty to require the secondary scan ?No what you’re talking about his procedure not capability. The 30 matches or what hashes are procedure. The problem is and I think I’ve stated it before is this procedure does not limit capability. There’s nothing hardcoded that would stop Apple from changing this to one match or changing what they’re looking for. Do you really not understand this?
You’re not speaking in fact sir. You’re speaking in conjecture. You have never seen apple’s implementation, no one has in the wild. Until that’s the case, and until there is a released audit, there are no facts other than what Apple presents us with. Or do you have special knowledge? More likely you’re taking assumptions as fact. Do you know what a fact is?You’re talking about the facts you want to talk about. How about the facts you said you understand? What is your thought on those facts?
You’re not speaking in fact sir. You’re speaking in conjecture. You have never seen apple’s implementation, no one has in the wild. Until that’s the case, and until there is a released audit, there are no facts other than what Apple presents us with. Or do you have special knowledge? More likely you’re taking assumptions as fact. Do you know what a fact is?
Read. What. I. Have. Written. I. Don’t. Base. My. Opinions. On. Conjecture. I. Will. Wait. To. Read. The. Security. Reviews. And. Audits. When. They. Come. Out. Until. Then. It’s. Conspiracy. Inspired. Guesswork. Regardless. Of. Whom. Said. What.Again I say.....
"We have to pass the bill in order to find out whats in it" -Speaker Pelosi
By then the damage is done.
It really doesn't bother you at all that the privacy community in general has come out against this implementation? I see from your posts that you have an odd, blind trust in Apple but Apple has already shown that they will adhere to "local" laws imposed by countries in which they operate so how long until the CCP introduces pictures of Tiananmen Square protests or pro Hong-Kong imagery into the hash list or just a completely different hash list and demands Apple report on these matches per local law?
<heavy sarcasm> Nice way of talking.Read. What. I. Have. Written. I. Don’t. Base. My. Opinions. On. Conjecture. I. Will. Wait. To. Read. The. Security. Reviews. And. Audits. When. They. Come. Out. Until. Then. It’s. Conspiracy. Inspired. Guesswork. Regardless. Of. Whom. Said. What.
Read. What. I. Have. Written. I. Don’t. Base. My. Opinions. On. Conjecture. I. Will. Wait. To. Read. The. Security. Reviews. And. Audits. When. They. Come. Out. Until. Then. It’s. Conspiracy. Inspired. Guesswork. Regardless. Of. Whom. Said. What.
Well, hello there, Capt. Kirk!Read. What. I. Have. Written. I. Don’t. Base. My. Opinions. On. Conjecture. I. Will. Wait. To. Read. The. Security. Reviews. And. Audits. When. They. Come. Out. Until. Then. It’s. Conspiracy. Inspired. Guesswork. Regardless. Of. Whom. Said. What.
Fact #1 Apple is scanning your photographs on the iPhoneYou’re not speaking in fact sir. You’re speaking in conjecture. You have never seen apple’s implementation, no one has in the wild. Until that’s the case, and until there is a released audit, there are no facts other than what Apple presents us with. Or do you have special knowledge? More likely you’re taking assumptions as fact. Do you know what a fact is?
Whether they use this to cross reference a CSAM database and view your photos after 30 or use it to cross reference a database provided by CCP and view them after 1 is just how it's implemented and can be changed. Once access is possible it's up to the people to determine what to use it for.indeed, it seems a relatively simple calculation to assume that apple wouldn’t advertise the search threshold if they really want to catch child abuse predators, why shouldn’t one photo be plenty to require the secondary scan ?
to actually say “we need 30 images of children being abused before we’ll do anything” … like if they only get 25 images of children being raped, “hey, none of our business, not 30”
if their scanning / matching algorithm is so sophisticated as to only make one mistake in a trillion, and they get someone with 23 matches, i am supposed to believe that they are just going to let that go ?
this simply makes no sense at all to me
And yet, many people are against it just in general, I suppose every single person against this is now a pedophile?I think you'd be pretty hard pressed (other than pedophiles) to find anyone that is actually against CSAM for what it does.
It's the "slippery slope" of what governments WILL do with this.
Google had developed face recognition many years ago...they were going to allow face searches on Google....the feds had them mothball this as it would have destroyed the witness protection program. (Amazon had a similar foray into this recently).
I suspect the feds did get a copy of Google's face search for their own purposes. Maybe there's a contract for that?
And, of course, we see a lot more face recognition going on today - being used in traffic cameras by law enforcement and even Walmart for frequent shoplifters.
It's not an if, it's a when with Governments. China will force Apple to turn this on for their own purposes. The "stick" that China uses is "You do this or you don't do business in our country" - it's not an empty threat. They're a big enough market, you'd be pretty hard pressed to find any company willing to turn away so much revenue. They use the "lawful access" crutch - anti-terrorism - as their justification for the requirement.
YOU have never seen it implemented in the wild yet you continually inject what you think is fact when the real fact is, you know just as much as everyone else 🙄 I’m not sure you know yourself what a fact is…You’re not speaking in fact sir. You’re speaking in conjecture. You have never seen apple’s implementation, no one has in the wild. Until that’s the case, and until there is a released audit, there are no facts other than what Apple presents us with. Or do you have special knowledge? More likely you’re taking assumptions as fact. Do you know what a fact is?
This is why it’s so hard to argue for privacy and rights. Police need to be able to check houses for drugs. What you don’t want your house checked? You must support drugsAnd yet, many people are against it just in general, I suppose every single person against this is now a pedophile?
Nope I havnt seen it either. But I’m not injecting anything into it. What are you talking about? I’m talking about what Apple has said - which are the only facts we have to go in. You’re all talking about hypothetical futures based on the potential you think the tech allows.YOU have never seen it implemented in the wild yet you continually inject what you think is fact when the real fact is, you know just as much as everyone else 🙄 I’m not sure you know yourself what a fact is…
Sure thing 🙄Nope I havnt seen it either. But I’m not injecting anything into it. What are you talking about? I’m talking about what Apple has said - which are the only facts we have to go in. You’re all talking about hypothetical futures based on the potential you think the tech allows.
massive difference. I’m not saying anything other than I’m not jumping on the conspiracy bandwagon until I have more actual knowledge. Not fake scary ‘knowledge’ about what may happen.
And yet I haven’t once said that. I have said wait to see some kind of proof.thinks like cupcakes2000, they simply believe "what Apple has said" and this is enough.
SANS NewsBites Vol. 23 Num. 068 : Open Redirect Links Still Being Used in Phishing Campaigns; Singapore Expands Crowd-sourced Vulnerability Hunting Program; CISA Says Stop Using Single Factor Authentication
Google Transparency Report: Geofence Warrants Increased by a Factor of 10
(August 27, 2021)
According to Google’s most recent transparency report, the company saw a significant increase in geofence warrants last year. Geofence warrants capture device data from users within a specified area over a specific amount of time. The number of warrants Google received for US locations in 2018 was 941; in 2020, that number was just over 11,000. Geofence requests now account for more than 25 percent of all law enforcement data requests Google receives.
Editor's Note
[Neely]
While this will not tell you if your user data was requested, it is interesting to see the groupings by request types. In the US, the top requests have shifted from search warrants, subpoenas and preservation requests to search warrants, preservation requests and subpoenas, indicating an uptick in investigative activities. Preservation requests hold information for future actions relating to active investigations until they can compel its legal release, and if the information is released it is reported in the other categories.
[Ullrich]
Build it and they will come. The ability to ask for geofence warrants is too tempting to not use them. This may serve as warning what may happen with other surveillance features built into future devices.