{"id":137601,"date":"2021-10-18T11:07:51","date_gmt":"2021-10-18T10:07:51","guid":{"rendered":"https:\/\/www.techweekmag.com\/?p=137601"},"modified":"2021-10-18T11:07:51","modified_gmt":"2021-10-18T10:07:51","slug":"cryptographers-call-apples-child-protection-feature-unsafe","status":"publish","type":"post","link":"https:\/\/www.stereoindex.com\/tech\/technology\/cryptographers-call-apples-child-protection-feature-unsafe\/","title":{"rendered":"Cryptographers call Apple&#8217;s child protection feature unsafe"},"content":{"rendered":"<p>A group of well-known cryptographers\u00a0<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-10-15\/experts-detail-flaws-in-apple-child-porn-tracking-system\">published a\u00a0<\/a><a href=\"https:\/\/arxiv.org\/pdf\/2110.07450.pdf\">study<\/a>\u00a0calling Apple&#8217;s new Child Abuse Tracking (CSAM) feature &#8220;dangerous technology.&#8221;<\/p>\n<p>They are confident that scanning people&#8217;s digital repositories for child pornography and other illegal content cannot be implemented in such a way as to simultaneously perform two conflicting tasks &#8211; to ensure the privacy of users and to help law enforcement agencies in catching criminals.<\/p>\n<p>Security researchers believe that Apple&#8217;s plans to prevent CSAM and similar proposals from the EU only expand the &#8220;powers of the state to spy&#8221;.<\/p>\n<blockquote><p>In other words, this is a very dangerous technology.\u00a0Even if initially it will be used for scanning CSAM materials, sooner or later there will be a desire to expand the scope of its application.\u00a0It is necessary to suppress the emergence of this technology at the stage of inception, otherwise it will be too late later.\u00a0It will be difficult for us to find a way to resist its spread and we will lose control over this system, the report says.<\/p><\/blockquote>\n<p>The authors of the report believe that the scanning method &#8220;in itself poses serious security and privacy risks for the entire society,&#8221; and the assistance it can provide to law enforcement agencies &#8220;is not so great.&#8221;\u00a0The experts noted that the client-side scanning algorithm can be bypassed and even used to the detriment of someone.<\/p>\n<p>Earlier, one of the users of Reddit\u00a0discovered\u00a0in iOS 14.3 the official part of the code of the algorithm that will be used to scan photos and find images of child abuse (CSAM).<\/p>\n<p>The user reverse-engineered the code, which allowed him to find a way to trick the algorithm and even abuse it.<\/p>\n<p>At this point, Apple has yet to announce when it intends to launch its child protection features, after delaying them due to concerns from security experts.\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/2110.07450.pdf\">The<\/a>\u00a0researchers&#8217;\u00a0<a href=\"https:\/\/arxiv.org\/pdf\/2110.07450.pdf\">report<\/a>\u00a0consists of 46 pages, and 14 cybersecurity experts contributed to its development.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A group of well-known cryptographers\u00a0published a\u00a0study\u00a0calling Apple&#8217;s new Child Abuse Tracking (CSAM) feature &#8220;dangerous technology.&#8221; They are confident that scanning people&#8217;s digital repositories for child pornography and other illegal content cannot be implemented in such a way as to simultaneously perform two conflicting tasks &#8211; to ensure the privacy of users and to help law [&hellip;] <a class=\"g1-link g1-link-more\" href=\"https:\/\/www.stereoindex.com\/tech\/technology\/cryptographers-call-apples-child-protection-feature-unsafe\/\">More<\/a><\/p>\n","protected":false},"author":10404,"featured_media":137603,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[805],"tags":[779],"class_list":{"0":"post-137601","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-news"},"acf":[],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts\/137601","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/users\/10404"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/comments?post=137601"}],"version-history":[{"count":0,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts\/137601\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/media\/137603"}],"wp:attachment":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/media?parent=137601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/categories?post=137601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/tags?post=137601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}