My only post of the day: is it about cybersecurity or preventing it? Apple seems hellbent on ruining decades of good work. Posters should understand this will NOT just be iPhones, it will inevitable be on all hardware devices you own, devices you paid Apple to provide you with a service, with processing power.
The falsehood about increasing privacy by having software on our devices was shown to be false yesterday when it was acknowledged in the last few days that Apple had been scanning iCloud email for some time along with other undefined scanning without mentioning it, but had not been scanning iCloud photos hence their actions now? (then do it the same way the server).
Now it was suggested increased privacy by installing a backdoor on hardware devices? the word I'd like to use could be seen to be obscene, so just suffice to say its 'ridiculous'.
So if they've already been scanning iCloud email from the cloud, then do the same with photos, via the cloud, not by imposing software onto individual devices THEY DO NOT OWN.
They have the right to put the software on the cloud and people using that facility will know what is happening, and for most I don't believe it would worry them too much.
To put software on hardware is opening a backdoor, albeit in the name of child safety, that can and will in my opinion be used and modified.
Child porn often starts at the grooming phase, so even the logic of software on our hardware is like shutting the stable door after the horse has bolted.
Without a contact most often through grooming on social media contact cannot take place and even passing of child porn photos are likely via on line services so to have a backdoor on individual hardware is potentially a very serious prospect of an all embracing surveillance culture even to your own equipment.
An excerpt from an organisation fighting child pornography and all credit to them.
"Those who seek to or are currently participating in the exploitation of children can connect on Internet networks and forums to sell, share, and trade material. These interactions are facilitated through several forms of internet technology, including websites, email, instant messaging/ICQ, Internet Relay Chat (IRC), newsgroups, bulletin boards, peer-to-peer networks, internet gaming sites, social networking sites, and anonymized networks"
Under the above no user hardware needs a backdoor, as whatever posters suggest, whether it pre hash checks, or anything else, processing and software via our hardware is unnecessary and potentially the backdoor for everything on your devices, and as seen with China, Apple do bend and with sufficient leverage from governments/dictators where ironically such leverage exists currently with official App Store inquiries ongoing in many countries, along with potentially expensive current lawsuits.
Now look again at the excerpt posted. "Internet networks" "Forums" "Websites" "Email" "Instant Messaging/ICQ" "Internet Relay Chat (IRC)", "newsgroups", "bulletin boards", "peer-to-peer networks", "internet gaming sites", "social networking sites" and "anonymised networks"
Non of this requires software on YOUR hardware, YOUR personal property, property YOU have paid Apple for.
To me, this is the problem, not the online checks, because these organisations can have these checks as can Apple on THEIR equipment, where it should be, without the need to install backdoors in billions of Apple devices.
Tim, if your attempt at helping to prevent child pornography is genuine, then stop this awful PR, where you have already sacrificed your iPhone ad campaigns with regards what happens on iPhone stays on iPhone and similar, don't sacrifice all your users to achieve an end you can easily do without software on devices YOU DO NOT OWN.
This sends alarm bells, as it is in any sense of the word SURVEILLANCE, and whether it starts with a few hundred bits, it still surveillance, and does lend a backdoor open to modification that makes the Orwellian nightmare look weak by comparison.
There is now an agreement with Interpol, including UK to share the hash network with NCMEC which is a good thing increasing the hash database enormously, but it also illustrates that even logistically speaking it makes no sense to have billions of devices having to have a hash list of millions, which rises considerably every week. On your servers you can update this in a few minutes without any processing loss to OUR hardware, and without the suspicion you are creating a backdoor which undoubtedly COULD be modified for serious intrusion and giving control over every aspect of our lives to organisations, politicians, governments of all ilk etc. etc. when that threat is substantially removed if you drop the idea of software on OUR hardware and instead put it where it will still do the job, still leave Apple's privacy policy on devices virtually unscathed and the suspicions has to be with the above that if you progress with software on our hardware it is for reasons totally disconnected from the excuse of fighting child pornography.
Noting that bespoke settings are well publicised with regards to Apple's and China, it is imperative any checks Apple does are via the cloud.