this post was submitted on 07 Oct 2023
222 points (94.8% liked)
Technology
59329 readers
4564 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It sounds like they have a database of CSAM images, so they're likely hashing parts of the suspected image or video and searching for that hash in the database
Right, so I guess the software is doing that prior to it being encrypted and sent.
Is the problem that it could do more than just scan for CSAM, ie. Anything that the government, or dictator, decides?
That's exactly the risk. There's no way to implement this type of client side scanning without building infrastructure that can then also be used to scan for other things.
Got it. Thanks!
This isn't like an anti-virus system. You can't just catalog them all. It's too easy to create. Hell, with the advent of LLMs and AI-generated images, it's going to be even easier to create.
Too easy to create and too easy to foil the hash, unless it’s some kind of highly sophisticated feature-based hashing.