this post was submitted on 28 Jun 2023
145 points (99.3% liked)

Apple

17277 readers
271 users here now

Welcome

to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!

Rules:
  1. No NSFW Content
  2. No Hate Speech or Personal Attacks
  3. No Ads / Spamming
    Self promotion is only allowed in the pinned monthly thread

Lemmy Code of Conduct

Communities of Interest:

Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple

Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode

Community banner courtesy of u/Antsomnia.

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] generalpotato 11 points 1 year ago (3 children)

Didn’t Apple try to introduce this and got a ton of flak from all sorts of privacy “experts”? They then scrapped their plans, did they not? How is this any better/different? Any sort of “backdoor” into encryption means that the encryption is compromised. They tackled this in 2014 in the US. Feels like deja vu all over again.

[–] [email protected] 12 points 1 year ago (4 children)

@generalpotato Ish. I read the technical write up and they actually came up with a very clever privacy-focused way of scanning for child porn.

First, only photos were scanned and only if they were stored in iCloud.

Then, only cryptographic hashes of the photos were collected.

Those hashes were grepped for other cryptographic hashes of known child porn images, images which had to be in databases of multiple non-governmental organizations; so, if an image was only in the database of, say, the National Center For Missing And Exploited Children or only in the database of China's equivalent, its cryptographic hash couldn't be used. This requirement would make it harder for a dictator to slip in a hash to look for dissidents by making it substantially more difficult to get an image in enough databases.

Even then, an Apple employee would have to verify actual child porn was being stored in iCloud only after 20 separate images were flagged. (The odds any innocent person even makes it to this stage incorrectly was estimated to be something like one false positive a year, I think, because of all of the safeguards Apple had.)

Only after an Apple employee confirmed the existence of child porn would the iCloud account be frozen and the relevant non-government organizations alerted.

Honestly, I have a better chance of getting a handjob from Natalie Portman in the next 24 hours than an innocent person being incorrectly reported to any government authority.

[–] [email protected] 3 points 1 year ago (2 children)

From a technical perspective, how much would an image need to be changed before the hash no longer matched? I've heard of people including junk .txt files in repacked and zipped pirated games, movies, etc., so that they aren't automatically flagged for removal from file sharing sites.

I am not a technical expert by any means, and I don't even use Apple products, so this is just curiosity.

[–] [email protected] 3 points 1 year ago (1 children)

It depends on the type of hash. For the type of hashing used by checksums, a single byte is enough, because they're cryptographic hashes, and the intent is to identify whether files are exact matches.

However, the type of hashing used for CSAM is called a semantic hash. The intent of this type of hash is that similar content results in a similar (or identical) output. I can't walk you through exactly how the hash is done, but it is designed specifically so that minor alterations do not prevent identification.

[–] [email protected] 1 points 1 year ago (1 children)

If, for instance, I was pirating a video game, would packing it in an encrypted container along with a Gb or two of downloaded YouTube videos be sufficient to defeat semantic hashing? What about taking that encrypted volume and spanning it across multiple files?

[–] [email protected] 1 points 1 year ago

Encrypting it should be enough to defeat either hash.

Without encryption I think it would depend on implementation. I'm not aware of the specific limitations of the tools they use, but it's for photo/video and shouldn't really meaningfully generalize to other formats.

[–] [email protected] 1 points 1 year ago

That's a good question. First it's important to understand that hash functions for pirated games or other programs are actually different from hash functions used to detect media like pictures, movies, and sound recordings.

If you alter a piece of code or text from the original version the hashes will no longer match, but typically those hashes should match and some kind of alarm gets tripped if they don't.

With media files like music, movies, or pictures, it works the other way around. Detection tools are looking for something that is not necessarily an exact match, but a very close match, and when such a match is found, alarms get tripped (because it's CSAM, or a copyright violation, or something like that).

As to the techniques you mentioned for concealing a pirated game in a ZIP file with a bunch of junk TXT files, that's not going to work. The reason it doesn't work is that if you ZIP something, all that uses compression algorithms that change the contents of the ZIP file in predictable repeating patterns. It's easy to detect and compensate for. Now, if you use your ZIP/compression tool to actually encrypt the file with a good algorithm and a strong password, that's different, but then you don't need to pack it with junk. (And distributing the password securely will be a problem.)

Please, people who know more about hashing and media detection with hashing, let me know if I got something wrong, I probably did.

[–] generalpotato 3 points 1 year ago

Haha! Thanks for the excellent write up. Yes, I recall Apple handling CSAM this way and went out of it’s way to try and convince users it was still a good idea, but still faced a lot of criticism for it.

I doubt this bill will be as thorough which is why I was posing the question I asked. Apple could technically comply using some of the work it did but it’s sort of moot if things are end to end encrypted.

[–] [email protected] 3 points 1 year ago (1 children)

Great writeup! I tried searching but came up short, do you have a link to the technical documentation?

[–] [email protected] 2 points 1 year ago

It would have worked and it would have protected privacy but most people don't understand the difference between having a hash of known CSAM on your phone and having actual CSAM on your phone for comparison purposes and it freaked people out.

I understand the difference and I'm still uncomfortable with it, not because of the proximity to CSAM but because I don't like the precedent of anyone scanning my encrypted messages. Give them an inch, etc.

[–] mitchacho74 7 points 1 year ago

I'm assuming it's either apple not wanting to be told to do it, or it's due to them "learning their lesson" and no longer support it, they seem to be leaning quite heavily into privacy

[–] [email protected] -2 points 1 year ago (1 children)

Apple wants money for spying on their users, this bill would compel them to do that without the secret money their getting now, so their against it

[–] generalpotato 3 points 1 year ago

Nah, Apple is one of the few companies around that is big on privacy and uses privacy as a differentiator for it’s products. Look at some of the other responses, it’s more complex than them just wanting money. They already make a boat load of it.