Category: Apple|Aug 24, 2021 | Author: Admin

"Apple is the largest platform for child pornography distribution"

Share on

There has been some outcry over Apple's CSAM program to uncover any child pornography on photos uploaded to iCloud Photos (CSAM, Child Sexual Abuse Material).

Manual review of your email
Apple has now confirmed to 9to5Mac that since 2019 they have scanned for abused material in iCloud Mail. They use “electronic signatures to expose suspected child exploitation. Every registered suspicion is checked manually ”.

 

It aroused 9to5mac's curiosity that one of Apple's executives could state that "Apple is the largest platform for distributing child pornography": How could he claim that if the company did not scan iCloud photos?

 

 

Several clues
9to5mac also had a couple of other clues that indicated that Apple must have run a form of CSAM scanning. An archived version of Apple's child safety page states:

 

Apple is dedicated to protecting children throughout the ecosystem, no matter where the products are used, and we support innovation in this area.

 

We have developed robust systems at all software levels throughout the chain. As part of this, Apple uses image matching technology to find and report child abuse.

 

Like spam filters in e-mail, we use electronic signatures to find suspected exploitation of children. We secure each match with individual review. Accounts with such content violate our Terms of Service and will be disabled.

 

Screener for illegal images
Another Apple CEO told a technology conference that the company uses screening technology to look for illegal images and that they disable accounts if they find material showing the exploitation of children, but did not say how they detect it.

 

Apple has confirmed to 9to5mac that they have been scanning outbound and inbound iCloud Mail for CSAM since 2019. Email is not encrypted so it is a trivial task to scan attached files that pass through Apple's servers.

 

“Limited scan of other data”
Apple also stated that they perform a limited scan of other data, but would not say what it was except to suggest that it was on a "small scale".

 

"Risk of abuse by the authorities"
Two Princeton University graduates say they have created a prototype of a scanning system based on the same approach as Apple's, but they gave up work because of the obvious risk of government misuse of such systems.

Sources: 9tomac

Sponsored Ads:

Comments:


Must be scrutinized extra carefully

Category: IT|Nov 28, 2022 | Author: Admin

Important drivers launched

Category: IT|Nov 27, 2022 | Author: Admin

Soon, Apple will make the big iPhone change

Category: Apple|Nov 26, 2022 | Author: Admin

Approaching the Apple iPhone

Category: Google|Nov 25, 2022 | Author: Admin

Apple fans will like this for the Tesla

Category: Apple|Nov 24, 2022 | Author: Admin

Microsoft is making an iPhone comeback

Category: Microsoft|Nov 23, 2022 | Author: Admin

This is how the iPhone 15 Pro becomes much faster

Category: Apple|Nov 22, 2022 | Author: Admin

Apple makes iPhone more like Android (if you want)

Category: Apple|Nov 21, 2022 | Author: Admin

These countries cheat the most and this is how they do it

Category: General|Nov 20, 2022 | Author: Admin

How to set up NightScout Docker using CyberPanel Hosting panel

Category: Tutorials|Nov 19, 2022 | Author: Admin

It will soon be over and out, warns Microsoft

Category: Microsoft|Nov 18, 2022 | Author: Admin

Now they can't fool around

Category: General|Nov 17, 2022 | Author: Admin

Must do as Meta

Category: General|Nov 16, 2022 | Author: Admin

Now Microsoft's big scare begins

Category: Microsoft|Nov 15, 2022 | Author: Admin

If they lose power, it's over and done with

Category: Google|Nov 14, 2022 | Author: Admin
more