![]() ![]() ![]() “Does Apple say no? I hope they say no, but their technology won’t say no.” “What happens when the Chinese government says, ‘Here is a list of files that we want you to scan for,’” Green said. Some say this technology could leave the company vulnerable to political pressure in authoritarian states such as China. Apple has also been scanning user files stored in its iCloud service, which is not as securely encrypted as its messages, for such images. Tech companies including Microsoft, Google, Facebook and others have for years been sharing “hash lists” of known images of child sexual abuse. “Researchers have been able to do this pretty easily,” he said. Matthew Green of Johns Hopkins, a top cryptography researcher, was concerned that it could be used against innocent people by sending them harmless images designed to appear as matches for child porn, fooling Apple’s algorithm and alerting law enforcement – essentially framing people. Mother supports mask mandate because children learn best inside the classroom
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |