Comment by dwaite
1 month ago
Sure, and they do that because Microsoft's CSAM detection product (which other providers like Google supposedly use) operates by having unencrypted data access to your files in the cloud.
What Apple wanted to do is do those operations using homomorphic encryption and threshold key release so that the data was checked while still encrypted, and only after having a certain number of high likelihood matches would the possibility exist to see the encrypted data.
So the optimistic perspective was that it was a solid win against the current state of the industry (cloud accounts storing information unencrypted so that CSAM products can analyze data), while the pessimistic perspective was that your phone was now acting as a snitch on your behavior (slippery slope etc.)
> while the pessimistic perspective was that your phone was now acting as a snitch on your behavior
The actual auditing doesn't happen until the file hits the cloud though. Which is what happens now.
Thanks for some voice of reason. I'm still amazed at how many are still upset about this but clearly never actually read the paper on it.
I'm just refuting what the person I responded to said, because apparently these services have hashes for more than just "the worst of the worst stuff" or whatever.
> because apparently these services have hashes for more than just "the worst of the worst stuff" or whatever.
Do you have a citation for that as well? I linked you what CSAM is. Where are you getting your information from?