The Ultimate Managed Hosting Platform

“This Is About Control, Not Children”: Eric Weinstein Calls Out Apple’s Virtuous Pedo-Hunter Act

Fight Censorship, Share This Post!

“This Is About Control, Not Children”: Eric Weinstein Calls Out Apple’s Virtuous Pedo-Hunter Act

Last week, Apple announced that they would begin analyzing images on its devices before they’re uploaded to the cloud in order to identify child pornography and report it to the authorities, sending privacy advocates through the roof.

Apple defended the decision – claiming there’s a ‘1 in 1 trillion chance of false positives.’

“Instead of scanning images in the cloud, the system performs on-device matching using a database of known CSAM image hashes provided by NCMEC (National Center for Missing and Exploited Children) and other child safety organizations. Apple further transforms this database into an unreadable set of hashes that is securely stored on users’ devices,” the company said in an announcement.

Privacy advocates have pointed out the obvious slippery slope of allowing big tech to infiltrate our personal lives under the guise of fighting [evil thing], and the next thing you know Apple is hunting dissidents for human rights abusers, reporting who owns what guns, or people taking ‘suspicious’ routes that deviate from their normal pattern. As the Electronic Frontier Foundation notes:

We’ve said it before, and we’ll say it again now: it’s impossible to build a client-side scanning system that can only be used for sexually explicit images sent or received by children. As a consequence, even a well-intentioned effort to build such a system will break key promises of the messenger’s encryption itself and open the door to broader abuses.

All it would take to widen the narrow backdoor that Apple is building is an expansion of the machine learning parameters to look for additional types of content, or a tweak of the configuration flags to scan, not just children’s, but anyone’s accounts. That’s not a slippery slope; that’s a fully built system just waiting for external pressure to make the slightest change. -EFF

 

They’re hypocrites anyway

Hitting it on the nose, as usual, is Eric Weinstein – who calls out Apple’s Tim Cook for scanning our *private* photos for child porn, while utterly ignoring Jeffrey Epstein’s high-level child-sex trafficking and ties to intelligence.

Also critical of Apple is WhatsApp head Will Cathcart – who says he’s “concerned” about Apple’s announcement, and “a setback for people’s privacy all over the world.”

More via Threadreader App

thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701474748506112″ dir=”auto” id=”tweet_2″>Child sexual abuse material and the abusers who traffic in it are repugnant, and everyone wants to see those abusers caught.
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701475595755524″ dir=”auto” id=”tweet_3″>We’ve worked hard to ban and report people who traffic in it based on appropriate measures, like making it easy for people to report when it’s shared. We reported more than 400,000 cases to NCMEC last year from @WhatsApp, all without breaking encryption.
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701475595755524″ dir=”auto”> 
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701475595755524″ dir=”auto”>

thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701476841385988″ dir=”auto” id=”tweet_4″>Apple has long needed to do more to fight CSAM, but the approach they are taking introduces something very concerning into the world.
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701477705404418″ dir=”auto” id=”tweet_5″>Instead of focusing on making it easy for people to report content that’s shared with them, Apple has built software that can scan all the private photos on your phone — even photos you haven’t shared with anyone. That’s not privacy.
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701478699528193″ dir=”auto”> 
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701478699528193″ dir=”auto” id=”tweet_6″>We’ve had personal computers for decades and there has never been a mandate to scan the private content of all desktops, laptops or phones globally for unlawful content. It’s not how technology built in free countries works.
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701478699528193″ dir=”auto”> 
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701479613894657″ dir=”auto” id=”tweet_7″>This is an Apple built and operated surveillance system that could very easily be used to scan private content for anything they or a government decides it wants to control. Countries where iPhones are sold will have different definitions on what is acceptable.
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701479613894657″ dir=”auto”> 
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701481559973890″ dir=”auto” id=”tweet_9″>Will this system be used in China? What content will they consider illegal there and how will we ever know? How will they manage requests from governments all around the world to add other types of content to the list for scanning?
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701481559973890″ dir=”auto”> 
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701481559973890″ dir=”auto”>Can this scanning software running on your phone be error proof? Researchers have not been allowed to find out. Why not? How will we know how often mistakes are violating people’s privacy?
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701482503692293″ dir=”auto” id=”tweet_10″>What will happen when spyware companies find a way to exploit this software? Recent reporting showed the cost of vulnerabilities in iOS software as is. What happens if someone figures out how to exploit this new system?
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701482503692293″ dir=”auto”> 
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701483493593088″ dir=”auto” id=”tweet_11″>There are so many problems with this approach, and it’s troubling to see them act without engaging experts that have long documented their technical and broader concerns with this.
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701484399521795″ dir=”auto” id=”tweet_12″>Apple once said “We believe it would be in the best interest of everyone to step back and consider the implications …”
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701484399521795″ dir=”auto”> 
thread#showTweet” data-controller=”thread” data-screenname=”wcathcart” data-tweet=”1423701484399521795″ dir=”auto”>…”it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.” Those words were wise then, and worth heeding here now.

More notable hot takes:

Tyler Durden
Sun, 08/08/2021 – 14:15


Fight Censorship, Share This Post!

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.