More on Appleās iPhone Backdoor
In this post, Iāll collect links on Appleās iPhone backdoor for scanning CSAM images. Previous links areĀ hereĀ andĀ here.
AppleĀ saysĀ that hash collisions in its CSAM detection system were expected, and not a concern. Iām not convinced that this secondary system was originally part of the design, since it wasnāt discussed in the original specification.
GoodĀ op-edĀ from a group of Princeton researchers who developed a similar system:
Our system could be easily repurposed for surveillance and censorship. The design wasnāt restricted to a specific category of content; a service could simply swap in any content-matching database, and the person using that service would be none the wiser.
Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices