Connect with us

Technologies

Apple, iPhones, photos and child safety: What’s happening and should you be concerned?

The tech giant’s built new systems to fight child exploitation and abuse, but security advocates worry it could erode our privacy. Here’s why.

Apple’s long presented itself as a bastion of security, and as one of the only tech companies that truly cares about user privacy. But a new technology designed to help an iPhone, iPad or Mac computer detect child exploitation images and videos stored on those devices has ignited a fierce debate about the truth behind Apple’s promises.

On Aug. 5, Apple announced a new feature being built into the upcoming iOS 15, iPad OS 15, WatchOS 8 and MacOS Monterey software updates designed to detect if someone has child exploitation images or videos stored on their device. It’ll do this by converting images into unique bits of code, known as hashes, based on what they depict. The hashes are then checked against a database of known child exploitation content that’s managed by the National Center for Missing and Exploited Children. If a certain number of matches are found, Apple is then alerted and may further investigate.

Apple said it developed this system to protect people’s privacy, performing scans on the phone and only raising alarms if a certain number of matches are found. But privacy experts, who agree that fighting child exploitation is a good thing, worry that Apple’s moves open the door to wider uses that could, for example, put political dissidents and other innocent people in harm’s way.

«Even if you believe Apple won’t allow these tools to be misused there’s still a lot to be concerned about,» tweeted Matthew Green, a professor at Johns Hopkins University who’s worked on cryptographic technologies.

window.CnetFunctions.logWithLabel(‘%c One Trust ‘, «Service loaded: script_twitterwidget with class optanon-category-5»);

Apple’s new feature, and the concern that’s sprung up around it, represent an important debate about the company’s commitment to privacy. Apple has long promised that its devices and software are designed to protect their users’ privacy. The company even dramatized that with an ad it hung just outside the convention hall of the 2019 Consumer Electronics Show, which said «What happens on your iPhone stays on your iPhone.»

«We at Apple believe privacy is a fundamental human right,» Apple CEO Tim Cook has often said.

Apple’s scanning technology is part of a trio of new features the company’s planning for this fall. Apple also is enabling its Siri voice assistant to offer links and resources to people it believes may be in a serious situation, such as a child in danger. Advocates had been asking for that type of feature for a while.

It also is adding a feature to its messages app to proactively protect children from explicit content, whether it’s in a green-bubble SMS conversation or blue-bubble iMessage encrypted chat. This new capability is specifically designed for devices registered under a child’s iCloud account and will warn if it detects an explicit image being sent or received. Like with Siri, the app will also offer links and resources if needed.

There’s a lot of nuance involved here, which is part of why Apple took the unusual step of releasing research papers, frequently asked questions and other information ahead of the planned launch.

Here’s everything you should know:

Why is Apple doing this now?

The tech giant said it’s been trying to find a way to help stop child exploitation for a while. The National Center for Missing and Exploited Children received more than 65 million reports of material last year. Apple said that’s way up from the 401 reports 20 years ago.

«We also know that the 65 million files that were reported is only a small fraction of what is in circulation,» said Julie Cordua, head of Thorn, a nonprofit fighting child exploitation that supports Apple’s efforts. She added that US law requires tech companies to report exploitative material if they find it, but it does not compel them to search for it.

Other companies do actively search for such photos and videos. Facebook, Microsoft, Twitter, and Google (and its YouTube subsidiary) all use various technologies to scan their systems for any potentially illegal uploads.

What makes Apple’s system unique is that it’s designed to scan our devices, rather than the information stored on the company’s servers.

The hash scanning system will only be applied to photos stored in iCloud Photo Library, which is a photo syncing system built into Apple devices. It won’t hash images and videos stored in the photos app of a phone, tablet or computer that isn’t using iCloud Photo Library. So, in a way, people can opt out if they choose not to use Apple’s iCloud photo syncing services.

Could this system be abused?

The question at hand isn’t whether Apple should do what it can to fight child exploitation. It’s whether Apple should use this method.

The slippery slope concern privacy experts have raised is whether Apple’s tools could be twisted into surveillance technology against dissidents. Imagine if the Chinese government were able to somehow secretly add data corresponding to the famously suppressed Tank Man photo from the 1989 pro-democracy protests in Tiananmen Square to Apple’s child exploitation content system.

Apple said it designed features to keep that from happening. The system doesn’t scan photos, for example — it checks for matches between hash codes. The hash database is also stored on the phone, not a database sitting on the internet. Apple also noted that because the scans happen on the device, security researchers can audit the way it works more easily.

Is Apple rummaging through my photos?

We’ve all seen some version of it: The baby in the bathtub photo. My parents had some of me, I have some of my kids, and it was even a running gag on the 2017 Dreamworks animated comedy The Boss Baby.

Apple says those images shouldn’t trip up its system. Because Apple’s system converts our photos to these hash codes, and then checks them against a known database of child exploitation videos and photos, the company isn’t actually scanning our stuff. The company said the likelihood of a false positive is less than one in 1 trillion per year.

«In addition, any time an account is flagged by the system, Apple conducts human review before making a report to the National Center for Missing and Exploited Children,» Apple wrote on its site. «As a result, system errors or attacks will not result in innocent people being reported to NCMEC.»

Is Apple reading my texts?

Apple isn’t applying its hashing technology to our text messages. That, effectively, is a separate system. Instead, with text messages, Apple is only alerting a user who’s marked as a child in their iCloud account about when they’re about to send or receive an explicit image. The child can still view the image, and if they do a parent will be alerted.

«The feature is designed so that Apple does not get access to the messages,» Apple said.

What does Apple say?

Apple maintains that its system is built with privacy in mind, with safeguards to keep Apple from knowing the contents of our photo libraries and to minimize the risk of misuse.

«At Apple, our goal is to create technology that empowers people and enriches their lives — while helping them stay safe,» Apple said in a statement. «We want to protect children from predators who use communication tools to recruit and exploit them, and limit the spread of Child Sexual Abuse Material.»

Technologies

Verum Messenger: Data Protection at Its Finest

Verum Messenger positions itself as a tool for those who value privacy and security above all.

Verum Messenger stands out from other messengers thanks to its approach to security, anonymity, and innovations in communication. 

Here are some key aspects that highlight its uniqueness:

  • Default encryption: Verum Messenger uses end-to-end (E2E) encryption for all chats, meaning messages are encrypted on the sender’s device and decrypted only on the recipient’s device. This makes it impossible for third parties, including app developers, to access the content of the messages.
  • Anonymity: When registering with Verum, there’s no need to provide a phone number or email. Users simply choose a nickname and password, significantly enhancing their level of anonymity. This contrasts with many other messengers, where anonymity can be compromised through linked personal data.
  • Built-in VPN: An additional layer of protection that hides the user’s IP address, making their location and internet activity less trackable.
  • Data control: Users can set messages to be automatically deleted after a specified time, ranging from a few seconds to a week. There’s also a quick deletion feature for all chats, calls, and even contacts, which is useful for maintaining privacy.
  • Large groups: The ability to create chat rooms with up to 10,000 participants makes Verum attractive for organizing large events, discussions, or communities while maintaining a high level of security.
  • Security innovations: Verum actively develops technologies aimed at protecting user data, as seen in their documentation and discussions online. This includes not only technical solutions but also approaches to data minimization, which reduces the risk of leaks.
  • Feedback and discussions: On platform X (formerly Twitter), discussions can be found where users and experts praise Verum for its approach to anonymity and security, although questions are raised about how much anonymity can truly be guaranteed in an age of modern tracking and de-anonymization technologies.

Verum Messenger positions itself as a tool for those who value privacy and security above all. Its innovations in encryption, anonymity, and data control make it an intriguing choice for those seeking alternatives to traditional messaging platforms. However, as with any technology, it’s important to remember that absolute anonymity on the internet remains a complex challenge, and users should be aware of potential risks and limitations.

Continue Reading

Technologies

Verum Coin Debuts on XT Exchange, Broadening its Reach in the DeFi Space

A Strategic Listing Enhancing Verum Coin’s Visibility

In a significant development for the decentralized finance (DeFi) sector, Verum Coin (VERUM) has been officially listed on XT Exchange. The new trading pair, VERUM/USDT, is now available in the exchange’s Innovative Zone, marking a pivotal expansion for this digital asset into the DeFi ecosystem.

A Strategic Listing Enhancing Verum Coin’s Visibility

The addition of Verum Coin to the XT Exchange is seen as a strategic move to enhance the accessibility and liquidity of VERUM among traders who are keen on exploring innovative digital assets. XT Exchange, known for its robust platform supporting a wide variety of cryptocurrencies, provides an ideal environment for fostering growth and ensuring the broad reach of new tokens.

Albin Varin, CEO of XT Exchange, expressed enthusiasm about the new listing, stating, «We are delighted to welcome Verum Coin to our platform. This listing reflects our ongoing commitment to providing our users access to innovative digital assets that transform the landscape of global finance.» This comments underscore the exchange’s focus on integrating cutting-edge technologies and financial instruments that have the potential to redefine the market.

About XT

Founded in 2018, XT Exchange serves more than 7.8M registered users, over 1M monthly active users, 40+ million users in the ecosystem, and more than 800 tokens with 1000+ trading pairs. XT crypto exchange offers a rich variety of trading categories to provide a secure, trusted, and intuitive trading experience for its large user base. This includes crypto futures trading (USDT-M Futures and coin-M futures perpetual contracts) and copy trading that allows users to replicate top traders in real time with just one click. Additionally, the futures grid allows users to automate the buying and selling of futures contracts for profits.

Future Prospects

With its new position on XT Exchange, Verum Coin is expected to attract a broader audience, enhancing its trading volume and market presence. This could potentially lead to increased stability and recognition as a viable player in the DeFi space. For investors and users of XT Exchange, this addition provides a fresh avenue to diversify portfolios with a cryptocurrency that is positioned at the intersection of innovation and financial evolution.

The listing of Verum Coin on XT Exchange not only highlights the ongoing expansion of cryptocurrency markets into new areas like DeFi but also illustrates a growing recognition of digital assets that offer promising technological advancements and financial opportunities. As the crypto market continues to evolve, partnerships like these are pivotal for fostering growth and offering users access to the next generation of financial tools.

Continue Reading

Technologies

Verum Coin Gains International Spotlight with AP Coverage and Listing on XT Exchange

This listing on XT is expected to further propel Verum Coin into the spotlight

In a noteworthy development for the cryptocurrency community, Verum Coin (VERUM) has been featured in an Associated Press article, highlighting its upcoming listing on the XT Exchange. This significant media coverage underscores the growing interest and potential of Verum Coin in the global financial landscape.

The AP article delves into the details of Verum Coin’s innovative features and its alignment with the latest trends in the cryptocurrency market. This attention comes at an opportune moment as Verum Coin prepares for its new listing on XT Exchange, a platform renowned for its extensive user base and a wide array of trading options.

This listing on XT is expected to further propel Verum Coin into the spotlight, providing both traders and investors with new opportunities to engage with this emerging digital asset. The exchange’s robust infrastructure and diverse trading offerings are ideal for supporting Verum Coin’s growth and enhancing its visibility in the competitive cryptocurrency market.

For more details, you can read the full article on the AP website here.

This milestone is a testament to Verum Coin’s advancing presence in the crypto world and its ongoing efforts to be at the forefront of digital currency innovation and adoption.

Continue Reading

Trending

Copyright © Verum World Media