|
You are here |
piotr.is | ||
| | | | |
excited-pixels.com
|
|
| | | | | Matt Burgess at Wired has a good summary article on the current (and always ongoing) debate concerning the availability of strong encryption. In short, he sees three 'classes' of argument which are aimed at preventing individuals from protecting their communications (and their personal information) with robust encryption. Governments or law enforcement agencies are asking for... | |
| | | | |
pxlnv.com
|
|
| | | | | Since 2022, the European Parliament has been trying to pass legislation requiring digital service providers to scan for and report CSAM as it passes through their services. Giacomo Zandonini, Apostolis Fotiadis, and Lud?k Stavinoha, Balkan Insight, with a good summary in September: Welcomed by some child welfare organisations, the regulation has nevertheless been met with [...] | |
| | | | |
stratechery.com
|
|
| | | | | While its possible to understand Apples motivations behind its decision to enable on-device scanning, the company had a better way to satisfy its societal obligations while preserving | |
| | | | |
www.schneier.com
|
|
| | | Apple's NeuralHash algorithm-the one it's using for client-side scanning on the iPhone-has been reverse-engineered. Turns out it was already in iOS 14.3, and someone noticed: Early tests show that it can tolerate image resizing and compression, but not cropping or rotations. We also have the first collision: two images that hash to the same value. The next step is to generate innocuous images that NeuralHash classifies as prohibited content. This was a bad idea from the start, and Apple never seemed to consider the adversarial context of the system as a whole, and not just the cryptography... | ||