• @irkli
    link
    English
    210
    edit-2
    1 year ago

    deleted by creator

    • @Misconduct
      link
      English
      431 year ago

      Other than their asinine charging cable/accessory situations I consistently find myself agreeing with Apple pretty much any time any government body or group is mad they won’t do something.

      • @linearchaos
        link
        English
        461 year ago

        They’re generally on the wrong side of the battle for right to repair and removable batteries too.

        But yeah, privacy they almost always have the right of it.

      • @TwanHE
        link
        English
        211 year ago

        Requiring usb c was something I agreed with. But indeed many times apple has rightly fought for their userbase.

      • @kameecoding
        link
        English
        181 year ago

        how do you reckon?

        only time they have been on the consumer’s side was with regards to privacy, refusing to comply with the FBI and now this.

        everything else they are pretty anti-consumer, off the top of my head

        • first to remove jack 3.5 (even though I don’t really care about this, others do.)
        • sticking to shitty lightning cable so they can sell overpriced cables
        • the charger thing with the EU
        • worst of all entirely against right to repair
        • Perhyte
          link
          English
          01 year ago

          To be fair, those first three points fall squarely under that “charging cable/accessory situations” exception. With Apple, it turns out that’s a pretty broad exception.

          • @lemme_at_it
            link
            English
            11
            edit-2
            1 year ago

            Bluetooth provides another vector of attack for the convenience. There is already quite a list of known vulnerabilities. Yes, many of these get patched but as the open standard evolves, so do the hackers. You could turn it off entirely, plug in a cable & forget all that if all you wanted to do was use audio/video.

          • @Yttra
            link
            English
            71 year ago

            Absolutely

          • @kameecoding
            link
            English
            1
            edit-2
            1 year ago

            like I said, I personally don’t care, but it’s a nice port, pretty ubiquitous and it’s nice to have choice for customers.

    • @[email protected]
      link
      fedilink
      English
      241 year ago

      Remember how everyone kicked up a giant stink about apple adding “on device CSAM scanning when uploading photos to iCloud”?

      They did that precisely because it would allow them to search for CSAM without giving up any privacy. As I said back when all that rage was happening, if apple don’t get to implement it this way you can be damn sure that the government is going to force them to implement CSAM scanning in a much more privacy-destroying way, and well here we are.

      • @[email protected]
        link
        fedilink
        English
        211 year ago

        CSAM without giving up any privacy.

        Hmmmm funny because security researchers said the opposite, I kinda believe them more?

        • @[email protected]
          link
          fedilink
          English
          21 year ago

          Who said it was givening up privacy. The worst I heard is slippery slope of they donthis they might ad more to it later. And how was it privacy compromising?

          • @4AV
            link
            English
            1
            edit-2
            1 year ago

            And how was it privacy compromising?

            1. Anything could be added to the hashes with the user having no way to know what’s being searched for beyond “trust us”. This could be partially alleviated if, for example, the hash had to be signed by organizations in a combination of states that’d make it difficult to push through hashes for anything other actual CSAM (so not just Five Eyes)

            2. Adversarial examples to intentionally set off the filter were demonstrated to be possible. Apple made it clear that there are types of content they’d be legally obligated to report once they became aware of, and it’d be well within a government agency’s capabilities to honeypot, say initially, terrorist recruitment material

            3. Coincidental false positives are also entirely possible (ImageNet had some naturally occuring clashes) and can result in their employees seeing your sensitive photographs

            4. The user’s device acting against the user cements other user-hostile and privacy-hostile behavior. “People could circumvent the CSAM scan” would be given as another reason against right to repair and ability to see/modify the software your own device is running

            5. Tech companies erode privacy by flip-flopping between “sure we’re giving ourselves abusable power, but we’ll stand up to governments pressuring us to expand this” and then “well what were we supposed to do, leave the market?” when they inevitably concede

            • @[email protected]
              link
              fedilink
              English
              1
              edit-2
              1 year ago

              What’s anything? They are not looking for any CSAM pictures they are looking for specific ones that are in a database. Its not like they can create a hash for a guy letting his dog on a horse and find all those pictures.

              • @4AV
                link
                English
                1
                edit-2
                1 year ago

                they are looking for specific ones that are in a database

                They could be looking for any images without your knowing - there’s no guarantee that those images came from a CSAM database.

                Its not like they can create a hash for a guy letting his dog on a horse

                They could trivially create a hash for a picture of a guy letting his dog on a horse (which would also include other very similar images).

                I didn’t necessarily mean to claim that they can scan for a concept lacking a fixed image, if that’s what you’re saying. That would theoretically be possible with enough hashes, but impractical.

      • @[email protected]
        link
        fedilink
        English
        151 year ago

        Like the politicians would have cared. This is just a convenient excuse. Either they would have found another one or they would have said “we can’t trust Apple to scan for this material. The police has to do these scans!”

        We were right to oppose it then and we are right to oppose it now.

        • @[email protected]
          link
          fedilink
          English
          -91 year ago

          We were right to oppose it then and we are right to oppose it now.

          You were right to oppose doing it in the most privacy conscious way? Or were you against CSAM scanning at all?

          • @[email protected]
            link
            fedilink
            English
            41 year ago

            It was a government provided list of hashes check against. For me, I don’t like it because I don’t trust 3 letter agencies to not abuse the ability to search every iDevice in the world for arbitrary file hashes.

            • @[email protected]
              link
              fedilink
              English
              01 year ago

              It was a database of hashes that were taken from the intersection of multiple country CSAM databases.

              Germany couldn’t just put a picture of a nazi in there and have every iPhone flag everyone that has a picture of a nazi on it unless multiple other countries also had that same picture in their CSAM db.

              It also only happened when you uploaded the photo to iCloud. Know what they do now instead? Just scan for CSAM on iCloud like google, Microsoft, imgur, Reddit, etc all do.

              The end result is the same in detecting CSAM, but the way apple proposed was more secure and valued your privacy more.

      • Hello Hotel
        link
        English
        71 year ago

        CSAM, as defined by apple, SPOILER that could be anything, including, and I could rattle off names, anything that threatens the government or those who got their tendrils into it, if we, For example have authoritarians change us to be facist, or re-introduce slavery or segrogation. A mere picture of your bedroom or face could have a somthing in it that allows you to be put into a cohort for later use (legal or not)

        • @[email protected]
          link
          fedilink
          English
          4
          edit-2
          1 year ago

          No, that’s not at all what it was defined as or what it could be. CSAM is Child Sex Abuse Material. It wasn’t going to be memes of winny the pooh like people argued.

          That’s also not how CSAM matching works. It simply compares hashes of images. If you take a photo of you in your bedroom with a sign saying “fuck the government” it will not match any CSAM database hashes no matter how authoritarian or fascist the government is, because they don’t have that same photo in their CSAM databases.

          You’re doing what the outraged did back then and thinking CSAM scanning is some sort of AI powered image recognition that scans images for specific things. It’s not that at all. It is a database of known CSAM images that have been hashed and that have been confirmed by multiple different governments (multiple different ones so one government can’t just put an image of their president that they don’t like in theirs and then find out who has uploaded that photo. If it only appears in one government CSAM database it will not be checked). It takes your photo, hashes it, and then checks to see if that hash is in the CSAM database. It won’t be, ever.

          You know what will be in there and matched? If you download child porn that is already out there on the web.

          • @Archer
            link
            English
            61 year ago

            You’re naive if you think that is all it will ever be, and that there will never be scope creep, especially malicious scope creep that turns into overreach

      • @bigdog_00
        link
        English
        51 year ago

        Anything scanning messages or media on my device is an absolute NO if I don’t control it.

        • @[email protected]
          link
          fedilink
          English
          21 year ago

          You did control it though. It only scanned what you were uploading to iCloud, and only during the upload process.

          If you turned off iCloud upload it never scanned anything.

    • @joel_feila
      link
      English
      201 year ago

      so basically apple doesn’t want government spyware on their phones