Connect with us

Technologies

Apple, iPhones, photos and child safety: What’s happening and should you be concerned?

The tech giant’s built new systems to fight child exploitation and abuse, but security advocates worry it could erode our privacy. Here’s why.

Apple’s long presented itself as a bastion of security, and as one of the only tech companies that truly cares about user privacy. But a new technology designed to help an iPhone, iPad or Mac computer detect child exploitation images and videos stored on those devices has ignited a fierce debate about the truth behind Apple’s promises.

On Aug. 5, Apple announced a new feature being built into the upcoming iOS 15, iPad OS 15, WatchOS 8 and MacOS Monterey software updates designed to detect if someone has child exploitation images or videos stored on their device. It’ll do this by converting images into unique bits of code, known as hashes, based on what they depict. The hashes are then checked against a database of known child exploitation content that’s managed by the National Center for Missing and Exploited Children. If a certain number of matches are found, Apple is then alerted and may further investigate.

Apple said it developed this system to protect people’s privacy, performing scans on the phone and only raising alarms if a certain number of matches are found. But privacy experts, who agree that fighting child exploitation is a good thing, worry that Apple’s moves open the door to wider uses that could, for example, put political dissidents and other innocent people in harm’s way.

«Even if you believe Apple won’t allow these tools to be misused there’s still a lot to be concerned about,» tweeted Matthew Green, a professor at Johns Hopkins University who’s worked on cryptographic technologies.

window.CnetFunctions.logWithLabel(‘%c One Trust ‘, «Service loaded: script_twitterwidget with class optanon-category-5»);

Apple’s new feature, and the concern that’s sprung up around it, represent an important debate about the company’s commitment to privacy. Apple has long promised that its devices and software are designed to protect their users’ privacy. The company even dramatized that with an ad it hung just outside the convention hall of the 2019 Consumer Electronics Show, which said «What happens on your iPhone stays on your iPhone.»

«We at Apple believe privacy is a fundamental human right,» Apple CEO Tim Cook has often said.

Apple’s scanning technology is part of a trio of new features the company’s planning for this fall. Apple also is enabling its Siri voice assistant to offer links and resources to people it believes may be in a serious situation, such as a child in danger. Advocates had been asking for that type of feature for a while.

It also is adding a feature to its messages app to proactively protect children from explicit content, whether it’s in a green-bubble SMS conversation or blue-bubble iMessage encrypted chat. This new capability is specifically designed for devices registered under a child’s iCloud account and will warn if it detects an explicit image being sent or received. Like with Siri, the app will also offer links and resources if needed.

There’s a lot of nuance involved here, which is part of why Apple took the unusual step of releasing research papers, frequently asked questions and other information ahead of the planned launch.

Here’s everything you should know:

Why is Apple doing this now?

The tech giant said it’s been trying to find a way to help stop child exploitation for a while. The National Center for Missing and Exploited Children received more than 65 million reports of material last year. Apple said that’s way up from the 401 reports 20 years ago.

«We also know that the 65 million files that were reported is only a small fraction of what is in circulation,» said Julie Cordua, head of Thorn, a nonprofit fighting child exploitation that supports Apple’s efforts. She added that US law requires tech companies to report exploitative material if they find it, but it does not compel them to search for it.

Other companies do actively search for such photos and videos. Facebook, Microsoft, Twitter, and Google (and its YouTube subsidiary) all use various technologies to scan their systems for any potentially illegal uploads.

What makes Apple’s system unique is that it’s designed to scan our devices, rather than the information stored on the company’s servers.

The hash scanning system will only be applied to photos stored in iCloud Photo Library, which is a photo syncing system built into Apple devices. It won’t hash images and videos stored in the photos app of a phone, tablet or computer that isn’t using iCloud Photo Library. So, in a way, people can opt out if they choose not to use Apple’s iCloud photo syncing services.

Could this system be abused?

The question at hand isn’t whether Apple should do what it can to fight child exploitation. It’s whether Apple should use this method.

The slippery slope concern privacy experts have raised is whether Apple’s tools could be twisted into surveillance technology against dissidents. Imagine if the Chinese government were able to somehow secretly add data corresponding to the famously suppressed Tank Man photo from the 1989 pro-democracy protests in Tiananmen Square to Apple’s child exploitation content system.

Apple said it designed features to keep that from happening. The system doesn’t scan photos, for example — it checks for matches between hash codes. The hash database is also stored on the phone, not a database sitting on the internet. Apple also noted that because the scans happen on the device, security researchers can audit the way it works more easily.

Is Apple rummaging through my photos?

We’ve all seen some version of it: The baby in the bathtub photo. My parents had some of me, I have some of my kids, and it was even a running gag on the 2017 Dreamworks animated comedy The Boss Baby.

Apple says those images shouldn’t trip up its system. Because Apple’s system converts our photos to these hash codes, and then checks them against a known database of child exploitation videos and photos, the company isn’t actually scanning our stuff. The company said the likelihood of a false positive is less than one in 1 trillion per year.

«In addition, any time an account is flagged by the system, Apple conducts human review before making a report to the National Center for Missing and Exploited Children,» Apple wrote on its site. «As a result, system errors or attacks will not result in innocent people being reported to NCMEC.»

Is Apple reading my texts?

Apple isn’t applying its hashing technology to our text messages. That, effectively, is a separate system. Instead, with text messages, Apple is only alerting a user who’s marked as a child in their iCloud account about when they’re about to send or receive an explicit image. The child can still view the image, and if they do a parent will be alerted.

«The feature is designed so that Apple does not get access to the messages,» Apple said.

What does Apple say?

Apple maintains that its system is built with privacy in mind, with safeguards to keep Apple from knowing the contents of our photo libraries and to minimize the risk of misuse.

«At Apple, our goal is to create technology that empowers people and enriches their lives — while helping them stay safe,» Apple said in a statement. «We want to protect children from predators who use communication tools to recruit and exploit them, and limit the spread of Child Sexual Abuse Material.»

Technologies

Verum Coin (VERUM) Expands Its Presence in the Global Crypto Market

Verum Coin (VERUM) Expands Its Presence in the Global Crypto Market

Verum Coin (VERUM), an innovative and increasingly popular digital asset, is now available on four leading Web3 wallets: Binance Web3 WalletCoinbase Web3 WalletOKX Web3 Wallet, and Bybit Web3 Wallet. This marks a significant milestone for the project as it continues to strengthen its position in the crypto industry.

The availability of VERUM on these platforms provides users with a wide range of secure and convenient options for managing their assets. Binance, Coinbase, OKX, and Bybit are well-established leaders in Web3 solutions, offering reliable tools for handling digital currencies.

What’s next?

In addition to wallet integration, Verum Coin is preparing for a major step forward—listing on all four platforms. This will create new opportunities for investors and enhance the asset’s liquidity on a global scale.

Why does this matter?

Being listed on major exchanges like Binance, Coinbase, OKX, and Bybit will serve as a powerful catalyst for the project’s growth. It will make VERUM accessible to millions of users worldwide and strengthen trust in the coin.

Stay tuned for updates so you don’t miss the moment when Verum Coin becomes even more accessible!

Continue Reading

Technologies

Verum Token Now Available on Binance, Listing of Verum Coin Expected Soon

Verum Token is now accessible for deposits and withdrawals on the Binance Wallet

Verum Token is now accessible for deposits and withdrawals on the Binance Wallet, the world’s leading cryptocurrency exchange. This milestone marks a significant step for the Verum ecosystem, allowing users seamless access to Verum on the platform.

Following the launch, Verum Coin’s value surged by 3%, reaching a new peak of $825.33 within just 24 hours.

With the Verum Coin listing anticipated soon, the excitement is growing, highlighting the project’s potential for further growth and adoption.

About Binance

Founded in 2017, Binance offers a secure, user-friendly platform with a broad selection of digital assets and trading pairs, supporting both retail and institutional traders. Listing Verum Token aligns with Binance’s strategy to include innovative, high-quality projects.

For more information, visit verumcoin.info.

Continue Reading

Technologies

Verum Messenger Update: New Levels of Security and Functionality

These privacy-oriented features make Verum Messenger one of the most secure and convenient messengers available today.

Verum Messenger, known for its commitment to privacy and innovation, has launched an update that enhances both user protection and performance. These privacy-oriented features make Verum Messenger one of the most secure and convenient messengers available today.

Key Updates in Verum Messenger:

  • Control Over Message Forwarding and Copying

The new feature enables users to restrict the forwarding and copying of their messages. Now, the sender decides whether their messages can be copied or forwarded to others — an essential addition for those who value control over the spread of their information.

  • Media Saving Settings for Private Chats

In one-on-one conversations, users now have the option to limit automatic media saving on their device. This feature is designed for those who prioritize privacy and prefer to keep sensitive photos and videos within the app itself.

  • Message Deletion Timer

The self-destructing message feature is a crucial tool for communicating in high-privacy environments. Users can now set a timer to delete messages after a specific period, adding an extra layer of security to personal conversations.

  • Enhanced Performance and Stability

In addition to these new features, Verum Messenger has boosted its performance, allowing for faster and more stable operation even under high usage. This improvement makes communication smoother, especially for those who rely heavily on the app for both work and personal needs.

Innovative Technologies for Your Convenience

Complementing this update, Verum Messenger also includes integration with Verum AI, a smart assistant that addresses everyday tasks right in the chat. The built-in eSIM and VPN allow users to connect to the internet and secure networks globally, providing complete freedom and safety.

Verum Messenger continues to be at the forefront of privacy and security, offering a reliable and user-friendly service for everyday communication.

Continue Reading

Trending

Copyright © Verum World Media