Comment by nbzso
4 years ago
The point is not to lose yourself in the technical implementation.
Design of the system is corrupt, implementation is done in a way to hide this with layers of complication and false "privacy" for "normal" users.
For me and many other people there is difference in knowing that Apple is the only responsible part in a contract and on other hand adding third party private corporation (funded by DOJ with more than 30 million dollars), which will "provide" the hashes and because of the sensitive nature of hashed material nobody will have access for auditing.
Nobody in their right mind believed Apple about "privacy". The difference here are that this is intrusion on my property from assumption that I am guilty until proven innocent.
A lot of normal people, without technical knowledge can see that this is a big problem.
Ignore the technical implementation then, it's still obvious that they have always been able to quietly spy on exactly everything you do on the phone. Definitely no need for this crazy CSAM tech if spying is what they want to enable.