|
You are here |
blog.cryptographyengineering.com | ||
| | | | |
www.schneier.com
|
|
| | | | | Apple's NeuralHash algorithm-the one it's using for client-side scanning on the iPhone-has been reverse-engineered. Turns out it was already in iOS 14.3, and someone noticed: Early tests show that it can tolerate image resizing and compression, but not cropping or rotations. We also have the first collision: two images that hash to the same value. The next step is to generate innocuous images that NeuralHash classifies as prohibited content. This was a bad idea from the start, and Apple never seemed to consider the adversarial context of the system as a whole, and not just the cryptography... | |
| | | | |
www.eff.org
|
|
| | | | | Apples new program for scanning images sent on iMessage steps back from the companys prior support for the privacy and security of encrypted messages. The program, initially limited to the United States, narrows the understanding of end-to-end encryption to allow for client-side scanning. While... | |
| | | | |
educatedguesswork.org
|
|
| | | | | ||
| | | | |
idratherbewriting.com
|
|
| | | Note: This content is entirely AI-generated, but with steering and shaping from me. Book club meeting recording Suleyman's main argument Pessimism aversion:... | ||