General > General Technical Chat
Apple privacy letter (Law enforcement through your phone)
<< < (14/24) > >>
magic:
Those who think they are usable don't seem to understand it, though.

... or they wouldn't think such things ;)
SilverSolder:

--- Quote from: magic on August 22, 2022, 02:09:55 pm ---Those who think they are usable don't seem to understand it, though.

... or they wouldn't think such things ;)

--- End quote ---

Haha yes, well, for calling your home to say you'll be a little late for dinner, they are probably OK! 

Making these devices the center of your life?  -  not so smart.
bd139:
Good article here as well on surveillance with a one liner that sums it up: https://pluralistic.net/2022/08/21/great-taylors-ghost/#solidarity-or-bust

“Successful shitty tech rollouts start with people you can abuse with impunity (prisoners, kids, migrants, etc) and then work their way up the privilege gradient.”
Red Squirrel:
This is the kind of stuff that makes no not trust phones for anything.  Phones are basically designed from the ground up to breach our privacy in every way possible.  I run a custom rom (CalyxOS) on mine where they stripped out all the google stuff so I'm probably safer, but I still feel uneasy as I can't help but wonder if there is still spying stuff right at the chip level. Like a sub OS running at a lower level.   Phones are just so closed, and basically black boxes, it's not like PC where it's a bit more open and you have more control.  Though I do wonder about modern PCs with UEFI etc since they are basically running a mini OS right on the chip, and there are allegations that Intel CPUs themselves have software on them too with spying stuff built in.   I really hate how everything is just designed to spy on us now days and the majority of people just accept it because "I have nothing to hide".
Halcyon:
I honestly don't understand what the big deal is? I think some people are quick to jump down Apple's throat, without knowing how this stuff works. Allow me to offer my view from a law enforcement perspective.

Hash sets derived from known child abuse material have been in existence for quite a long time now. There are a handful of "standard" ones that law enforcement and other companies use. The two biggest ones are Project VIC and CAID. The Australian Federal Police also maintain a hash set that is used by law enforcement agencies here. They only contain hashes of known child abuse material; that is, material that has already been viewed and classified by specialists in the field. They do not contain hashes of images/videos that "might be" child abuse material (an example of this might be an image of a young child where they may or may not be of legal age).

These hash sets are "open" in a sense that, if you are from an agency who has a need to investigate such matters, you can gain access to them. They are also available to manufacturers and developers of digital forensics products. They are not open to the general population for download, because the first thing the criminals will do is "wash" their material through these hash sets to ensure nothing matches.

They use algorithms which will not experience a hash collision, that way, every single file in the world will have it's own, unique hash. Comparing a hash against the hash of your personal files does not reveal private or sensitive information about you (unless you're a paedophile).

Secondly, Apple isn't the first to do this. If you upload content to any number of cloud platforms, whether it be Facebook, TikTok, Instagram, Google, Mega.io etc... etc... they will scan for this kind of content and notify law enforcement agencies if it's located. They will also hand over data (including customer information) when the appropriate authority is given. As a user of these services, you should already be aware of this as you've already agreed to it.

Having being the lead analyst in some of the most horrific and inhumane crimes imaginable, an individuals "privacy" is irrelevant in my opinion. Morally speaking, your human right to protect your dick pics from prying eyes doesn't trump the greater good of the community when these sorts of offences are involved.

Of course I'm generalising, and there will be valid arguments on both sides of the fence. I value my privacy just like anyone else, but at the end of the day, if it's not a system you designed, you likely don't have complete control of your data, so treat it as such. Ultimately, you as the end-user have a choice on where to spend your money or store your data. No one is forcing you.
Navigation
Message Index
Next page
Previous page
There was an error while thanking
Thanking...

Go to full version
Powered by SMFPacks Advanced Attachments Uploader Mod