Financial Times: Apple plans to scan US iPhones for child abuse imagery
Financial Times: Apple plans to scan US iPhones for child abuse imagery. https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f
I suggest we task Matt Green with the assassination of Tim Cook. He's already practically volunteering. matthew_d_green · Aug 5 Regardless of what Apple’s long term plans are, they’ve sent a very clear signal. In their (very influential) opinion, it is safe to build systems that scan users’ phones for prohibited content. That’s the message they’re sending to governments, competing services, China, you. Matt Blaze can be his wingman. Then - when they're executed - we can organize a Million Matt March on Washington.
On Thursday, August 5, 2021, 11:46:10 PM PDT, jim bell <jdb10987@yahoo.com> wrote:
Financial Times: Apple plans to scan US iPhones for child abuse imagery. Apple plans to scan US iPhones for child abuse imagery
| | | | | | | | | | | Apple plans to scan US iPhones for child abuse imagery Security researchers raise alarm over potential surveillance of personal devices | | | This raises the question: When will be the first piece of malware whose function is to secretly place 'child abuse imagery' onto someone's iPhone, for later 'detection' by Apple...leading to a prosecution? Jim Bell
For those not inclined to Voertrek down Batshit, Gramps, Dumbell, Semitch screaming, brainrot avenue, Matt Blaze is sending some 'signal' on this. https://twitter.com/mattblaze?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%... mattblaze 4h Yes, I’ve heard of the Clipper chip. I’m a little rusty on the details, but I suppose it might be relevant. I’ll check it out, thanks.
To make sure the obvious is stated: The problem here is that it means that people who make iphones and operate trojan networks on iphones can abuse children with impunity and pin the abuse on others, by manipulating the evidence apple collects. This would be a better program if it were on an open source phone available for public audit, and stored the photos on a public secure place like a blockchain. Then, if you're an abused kid, you can take a photo of yourself and suddenly everyone knows. But with this, your parents can pay the black market to keep abusing you.
On Fri, Aug 6, 2021, 3:59 PM Punk-BatSoup-Stasi 2.0 <punks@tfwno.gf> wrote:
On Fri, 6 Aug 2021 15:38:13 -0400 Karl <gmkarl@gmail.com> wrote:
This would be a better program if it were on an open source phone available for public audit,
LMAO! Fuck you karl, US govt agent of feminazi kind.
Punk, only part of my brain is working for the US govt! It is the part filled with scared habits, but it is not all of me. I am, however, a proud feminazi who refuses to consciously oppress white men. Happy hacking.
On Fri, 6 Aug 2021 06:45:30 +0000 (UTC) jim bell <jdb10987@yahoo.com> wrote:
Financial Times: Apple plans to scan US iPhones for child abuse imagery.
fucking hilarious - and we shouldn't expect less from non human, puritan US turds. All these anti-sex criminal nutcases need to be exterminated ASAP.
On 06/08/2021 07:45, jim bell wrote:
Financial Times: Apple plans to scan US iPhones for child abuse imagery. https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f <https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f>
Surely that is the job of the NSA, not Apple? It would be the criminal offense of unlawful interception if they did it in the UK. Not that UK law is much good, but "they" do need a warrant to look at content for that sort of purpose. Except sometimes one warrant can cover a hell of a lot of content... but not that. And Apple couldn't get such a warrant anyway, it could only be issued to Police or similar. Peter Fairbrother
I, for one, violently object to any suggestion that any national security agency conduct any mass-surveillance operations going forward. " No taxation without representation " and no domestic espionage without a democratic vote on it. Surely this is a key job for the average cypherpunk where ' privacy for the poor and transparency for the powerful ' is the ideal. Yes? On Saturday, 7 August 2021, 09:09:17 am AEST, Peter Fairbrother <peter@tsto.co.uk> wrote:
Surely that is the job of the NSA, not Apple?
On Fri, Aug 6, 2021, 2:46 AM jim bell <jdb10987@yahoo.com> wrote:
Financial Times: Apple plans to scan US iPhones for child abuse imagery.https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f
Here's one without a paywall. https://www.npr.org/2021/08/06/1025402725/apple-iphone-for-child-sexual-abus... Not sure what the paywall'd one says, but this one focuses on child pornography, which makes it harder to argue for a public system. Other corps are doing this. Free software generally does not. The detection algorithm is transported in the form of a pretrained computer vision model, which opens other concerns too, of course, via its generality and obscurity.
On 06/08/2021 07:45, jim bell wrote:
Financial Times: Apple plans to scan US iPhones for child abuse imagery. https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f <https://www.ft.com/content/14440f81-d405-452f-97e2-a81458f5411f>
https://www.theguardian.com/technology/2021/aug/06/apple-plans-to-scan-us-ip... "Alongside the neural Match technology, Apple plans to scan users’ encrypted messages as they are sent and received using iMessage." I thought iMessages were supposed to be end-to-end encrypted. Obviously not, if they were then it would be impossible to scan them that way. Hmmm, looking further (or perhaps just thinking about it more, I have drink taken :) , what is being talked about is Apple looking at photos as they go in their cloud. Is there a button to encrypt cloud content? Would make sharing harder, but Peter Fairbrother the point of moot is to give the kind of access to crypto protection that an expert can create to every user.
Would make sharing harder, but
Peter Fairbrother
the point of moot is to give the kind of access to crypto protection that an expert can create to every user.
Hi Peter, I received your message disordered a little, are you able to rephrase what easy-to-use cryptographic technology you're referring to here?
On 07/08/2021 01:06, Karl wrote:
Would make sharing harder, but
Peter Fairbrother
the point of moot is to give the kind of access to crypto protection that an expert can create to every user.
Hi Peter,
I received your message disordered a little, are you able to rephrase what easy-to-use cryptographic technology you're referring to here?
moot (or m-o-o-t) was (in 2000) (is, in the disassembled-bits-in-the-garage sense) a proposed bootable based-on-OpenBSD OS CD with end-to-end real-time and stored messaging and deniable storage apps under which the user would have to be really dumb to expose content, even under the UK's gimme-the-keys-or-go-to-jail laws. At the time optical storage was bigger than it is now, but it could be adapted to eg a USB key. I later added an undetectable "tweet"ing function. Didn't happen for various reasons, mostly because I am a lazy coder, but its potential existence did have some effect on the UK crypto laws. Peter Fairbrother the laws: 0 It's all about who is in control 1 Someone else is after the stuff you have 2 Stuff you don't have can't be taken from you 3 Everywhere can be attacked 4 Complex systems provide more places to attack 5 Attack methods are many, varied, ever-changing and eternal 6 Only those you trust can betray you 7 Holes for good guys are holes for bad guys too 8 A system which is hard to use will be abused, misused and unused
On Fri, Aug 6, 2021, 9:00 PM Peter Fairbrother <peter@tsto.co.uk> wrote:
On 07/08/2021 01:06, Karl wrote:
Would make sharing harder, but
Peter Fairbrother
the point of moot is to give the kind of access to crypto protection that an expert can create to every user.
Hi Peter,
I received your message disordered a little, are you able to rephrase what easy-to-use cryptographic technology you're referring to here?
moot (or m-o-o-t) was (in 2000) (is, in the disassembled-bits-in-the-garage sense) a proposed bootable based-on-OpenBSD OS CD with end-to-end real-time and stored messaging and deniable storage apps under which the user would have to be really dumb to expose content, even under the UK's gimme-the-keys-or-go-to-jail laws.
https://misc.openbsd.narkive.com/csKqlk8N/m-o-o-t-some-decisions cool, thanks for explaining Peter Fairbrother
the laws:
0 It's all about who is in control
1 Someone else is after the stuff you have
2 Stuff you don't have can't be taken from you
3 Everywhere can be attacked
4 Complex systems provide more places to attack
5 Attack methods are many, varied, ever-changing and eternal
6 Only those you trust can betray you
7 Holes for good guys are holes for bad guys too
8 A system which is hard to use will be abused, misused and unused
participants (5)
-
jim bell
-
Karl
-
Peter Fairbrother
-
professor rat
-
Punk-BatSoup-Stasi 2.0