Do we know if Google scans Google Photos or if Microsoft scans OneDrive Photos?
They might be doing this already and we don't even know it...
They might be doing this already and we don't even know it...
I guess I just don’t care enough if people look at my pictures. You can see my dog, my food, places I’ve traveled. Heck I post some of these of different suicidal media sites anyways. Why are people so freaked out about someone seeing your pictures. If that’s the case you either have some skeletons in your closet or you probably shouldn’t be using technology this advanced. Either that or your in the CIA. I am none of those 3, so it just doesn’t bother me.
Do we know if Google scans Google Photos or if Microsoft scans OneDrive Photos?
They might be doing this already and we don't even know it...
Didn't you just write that they only scan pictures that are uploaded to iCloud, where of course Apple can see them and even scan them? And - surprise - it turns out they have been scanning photos on iCloud all long . So why exactly do they suddenly need to scan our devices? The only reason I can think of is that they are laying the groundwork for future developments ...
They do (on their servers), as do Facebook, Twitter, Apple (before the new announcement) and others. See:Do we know if Google scans Google Photos or if Microsoft scans OneDrive Photos?
They might be doing this already and we don't even know it...
That makes no sense to me, since they can apply the exact same algorithms they are using on the device on their cloud servers. Since the database, hash function, threshold parameters and other details of the algorithm are secret, the on-device method requires you to blindly trust Apple anyway. The difference is that when doing it in the cloud, they don't need to intrude my device and undermine any E2E encryption.Because, as I and others (and Apple themselves) have already explained, it's more private to scan on your device (because the scan "results" if you will are stored on your phone where Apple can't read them). They are voluntarily saying, "Hey, we're going to keep scanning photos for illegal material, but we're going to increase the security/privacy of this scanning by changing the method of how we do it."
My guess is that they are building the infrastructure to also scan for "suspicious" content in E2E-encrypted services such as iMessage.Such as…
That makes no sense to me, since they can apply the exact same algorithms they are using on the device on their cloud servers. Since the database, hash function, threshold parameters and other details of the algorithm are secret, the on-device method requires you to blindly trust Apple anyway. The difference is that when doing it in the cloud, they don't need to intrude my device and undermine any E2E encryption.
What I do know is that I can control what my device uploads to the cloud, but that I cannot control or even find out what exactly Apple's secret scanning algorithms do on my device.Well if you're just going to disbelieve Apple or think you know better than them, then obviously nothing I can say is going to change your mind. No point in further discussion.
This is so wrong. A kid could take a picture of themselves and have their photo sent to the police.
What I do know is that I can control what my device uploads to the cloud, but that I cannot control or even find out what exactly Apple's secret scanning algorithms do on my device.
you are not a functional part of society and we do not welcome youWhat’s all over? Your crimes?
They've already told you what they're doing, but apparently you don't believe them. I do. That's the fundamental difference between us here. There's all kinds of advanced software on your phone already that you are trusting Apple isn't doing devious things with in the background without your knowledge. I don't see why this is any different. I guess the word "scan" triggers some people.
It's because they're playing police. They're welcome to do that with anything I upload to their servers. But they shouldn't be able to investigate things on my device without my permission - even if they can't do anything with it until I choose to upload it. Use your own servers to do that, not my phone. It's the same reason they've rejected requests from the FBI to break into previous devices. Why was that not ok, but this is? (I know the encryption answer, but the general concept is the same)
Ah, but how do you KNOW with 100% certainty there isn't also some hidden process going on that Apple is covering up! /s See, if people want to go conspiracy theorist about things, there's no end to that rabbit hole. No matter what you tell them, they will keep insisting that "we don't know" or "there are still unanswered questions." They thrive off that. They don't want it to end or be resolved, because then they have no soap box to stand on anymore.And this is a completely different thing than search indexing or other background software services that go on. Those aren't "investigating" anything.
Also, you never really answered this, which is the same point I've been trying to make, "That makes no sense to me, since they can apply the exact same algorithms they are using on the device on their cloud servers. Since the database, hash function, threshold parameters and other details of the algorithm are secret, the on-device method requires you to blindly trust Apple anyway. The difference is that when doing it in the cloud, they don't need to intrude my device and undermine any E2E encryption."
But they aren't investigating it on your phone. All that's happening is illegal images are being marked - no investigation happens until you upload a certain number of those to iCloud. This is completely different--even in general concept--to the FBI case, because no third party or even Apple themselves is being allowed access to content on your phone itself.
Ah, but how do you KNOW with 100% certainty there isn't also some hidden process going on that Apple is covering up! /s See, if people want to go conspiracy theorist about things, there's no end to that rabbit hole. No matter what you tell them, they will keep insisting that "we don't know" or "there are still unanswered questions." They thrive off that. They don't want it to end or be resolved, because then they have no soap box to stand on anymore.
How are they undermining E2E encryption? Any images (illegal or not) sent to iCloud servers can already be read by Apple since they are in technically the recipient whom you're sending the images to. All this scan is doing is alerting them if some of these photos are CSAM during that transfer. But since the actual analyzation of each of your images is being done on your device, Apple isn't looking at data from your non-CSAM photos. If they continued to scan in the cloud, they WOULD be looking at it. I understand that of course Apple can already see your images on the cloud, but now there's no reason for them to "look" at all of them (in terms of analyzation) there because that's already been done on your device, which they can't "see."
I have a feeling you're going to tell me that doesn't answer your question, but I'm afraid I'm not an expert at this highly technical subject and the above is the best I can do, so if you want a more detailed technical answer, I'd suggest contacting Apple.
Do we know if Google scans Google Photos or if Microsoft scans OneDrive Photos?
They might be doing this already and we don't even know it...
Actually no, they haven't. There are tons of critical details missing in the documentation they have released so far, both technical and in terms of what policies are applied e.g. to prevent abuse. A lot of it is intentionally being kept secret, which prevents any serious review and means there is no accountability. This is not acceptable for such a drastic step.They've already told you what they're doing, but apparently you don't believe them.
I think you don't know what you are talking about, or perhaps haven't thought through what this new approach means. Too many Apple fans who are blindly defending everything they do.I do. That's the fundamental difference between us here.
Some of this is above my head as well... but again, I just don't see the difference. Unless I'm mistaken, they're scanning every photo on my device to see if there is a hash that matches a hash on the list they're going to put on my device with iOS 15. If there are enough matches, they'll then flag the matches and have them transmitted via a safety voucher system.
And you don't even know what that number is, because they are keeping it a secret ...But they aren't investigating it on your phone. All that's happening is illegal images are being marked - no investigation happens until you upload a certain number of those to iCloud.
You have a very shortsighted view. At first they are only applying the hash matching to iCloud Photo library, which isn't end-to-end encrypted. But that's precisely why it will likely not end there, because if you think about it it doesn't make sense to go to the effort of implementing this on-device system for something that isn't E2E encrypted (because it's much easier and less "creepy" from the marketing perspective if they can do it in the cloud). They will almost certainly apply it to E2E encrypted services going forward, perhaps existing ones like iMessage or new ones. What they have implemented is an "exceptional access" system of the kind that certain politicians have demanded for years in order to undermine E2E encryption.How are they undermining E2E encryption? Any images (illegal or not) sent to iCloud servers can already be read by Apple since they are in technically the recipient whom you're sending the images to.
We're just going in circles now and names and put-downs are being exchanged
Let's face, it - the technology here is probably beyond the full understanding of 99.9% of the members of this forum. I think because of it being so complicated, it makes it a subject ripe for misinterpretation, misinformation, conspiracy theories, fear-mongering, etc.
This will be my last comment on this thread or any other thread about this, at least for a long while. We're just going in circles now and names and put-downs are being exchanged by many (including myself), which isn't really helpful. I just take the position of "innocent until proven guilty," and many of you take the opposite.