Apple Specifies Measures Against Child Pornography

Apple is responding to criticism of its announced system to track down child pornographic photos , which has raised concerns among privacy advocates. The group announced that only content that was brought in by at least two child protection organizations from different countries should come into a database for comparison with known abuse images.

Critics of Apple's plans had warned, among other things, that an authoritarian state could try to smuggle pictures with political motives into the database in order to find out who had them on their iPhone.

Read more: Apple Will Automatically Search For Child Pornography Photos On iPhones

The function to search for child pornographic material is initially limited to iPhone users in the USA who use Apple's online storage service iCloud. It is not about analyzing the content of all existing images. Instead, a file with so-called hashes of known child pornographic content should be loaded onto the devices - a kind of digital fingerprint of the image. This means that a copy of the photo can be recognized when comparing with special procedures.

If there is a match, suspicious images are provided with a certificate, thanks to which Apple can exceptionally open them after uploading them to iCloud and subject them to an examination . The system only sounds the alarm when there are a certain number of hits. When it was first announced last week, Apple did not provide any information about how many matches the system would hit. On Friday, the group announced that the threshold should be around 30 images.

Read also: iPhone 13 || Apple Will Bet Everything On The Camera

After the first criticism, Apple had already assured that it would reject any attempts by governments to abuse the process to search for other content. 

Read more: Hacker Attack || Stolen Cryptocurrency Partially Returned

At the same time, some cryptography experts and IT security researchers, among others, had criticized the fact that the creation of such a system alone opens up the possibility for authoritarian governments to require Apple to add other content to the database with the hashes and thus to conduct political surveillance.

Do You Know What We Have Posted on

Twitter Facebook Instagram Reddit tumblr

Post a Comment