E2E cels, how can we recover ?

https://twitter.com/__tux/status/1705658864132050987
30
Jump in the discussion.

No email address required.

they hash everything on their severs and compare those hashes to the ones from national center for missing and exploited children

there's not much else they can do

Jump in the discussion.

No email address required.

Actually they do not. They were going to, but Reddit and Tech Journ*lists cried about it and they backed down in the end.

Jump in the discussion.

No email address required.

No. They were already do scanning on the cloud the plan was to do it on the phone.

This was to provide a justification for enabling End-to-End-Encrypted iCloud - as in you could have fully encrypted iCloud backup that Apple could not access but your phone could scan for CSAM locally.


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

oh

well in any case i just like seeing apple get bussy blasted (pun intended)

Jump in the discussion.

No email address required.

>cried

some people were able to craft hash collisions, be glad they didn't implement it anyways since you would be in prison for a dancing dog gif

Jump in the discussion.

No email address required.

anyone with even a shred of experience should know by now that hashes are practically superficial when dealing with media, and theres a 100% chance that agencies like the fbi, nsa, cia, etc are using more novel methods of comparison and detection than only using hash comparisons. there are likely several methods of image comparison that are not dependent on image translation, resolution, color/luminance data, or orientation that are in active use, and i would posit that the technologies for these kinds of recognition cowtools have stemmed from the national defense sector of the us military.

Jump in the discussion.

No email address required.

Nice gets

Jump in the discussion.

No email address required.

Jump in the discussion.

No email address required.

Financial backers of the Hopewell Fund include Swiss billionaire Hansjörg Wyss, LinkedIn founder Reid Hoffman, Iranian-American billionaire and eBay founder Pierre Omidyar, and Hungarian-American billionaire George Soros

https://en.wikipedia.org/wiki/Hopewell_Fund#Early_Life

Jump in the discussion.

No email address required.

The Hopewell Fund is a 501(c)(3) nonprofit organization managed by Arabella Advisors, a for-profit consulting company that advises left-leaning donors and nonprofits about where to give money and serves as the hub of a politically liberal "dark money" network in the United States.[1] The Hopewell Fund serves as the fiscal sponsor for various left-leaning political projects.[2] The Hopewell Fund spent over $127 million in 2020, and is one of the five largest nonprofits associated with the Democratic Party.[3]

Wtf how hasn't this been sanitized by power users yet?

Jump in the discussion.

No email address required.

Okay, then what? Plenty of unencrypted pcs with CP on em rn

OH wait, that IS the plan

Jump in the discussion.

No email address required.

Doesn't Apple scan people's files for CSM automatically?

Jump in the discussion.

No email address required.

Encrypted csam looks like any other encrypted file, so this is anti-encryption propaganda that can be used against anyone who doesnt offer a backdoor to glowBIPOCs

Jump in the discussion.

No email address required.

Some scientists think it could be lifestyle related (herbs, garlic, unknown), but it is a FACT : JEWISH WOMEN UNDERGARMENTS are rated LEAST ATTRACTIVE SMELL to all men, in many studies.

Snapshots:

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.