In other court filings it was revealed how Apple managed to monitor emails sent through iCloud seeking child abuse pictures while maintaining the privacy and security of the platform.
Apple uses automated comparison programs to hurry of files sent with an invalid material database also mark messages for later review.
The documents obtained by Forbes are part of a search warrant applied to Seattle and explain the security plan Apple lists illegal messages outside your system.
A comparison of to hurry
ICloud uses a comparison program for to hurry. The work hash It is a mathematical function that creates a "summary" of a value.
If we understand computer texts such as their collections and zeros we can add a a mathematical method that summarizes these numbers with a different value for each document. Yes, two to hurry the same is said to be the same text. And why compare to hurry instead of texts? For many reasons, one is private, because with to hurry The system only detects a series of calculations without further explanation, and another to be more efficient, comparing two numbers, for example, 50 counts is a lot easier than comparing millions of zeros with those that make a document.
Apple has developed a database with banned images and has produced a rapid recovery of these images. When an email message is sent through iCloud the to hurry of attached files containing this database, if there is a match the post is marked for review.
Marked emails refer to a specific computer within Apple confirming that the messages are not illegal, in which case Apple report to the authorities ability.
This program very efficient and private used by other companies that send messages to organizations such as the National Center for Missing and Exploited Children when the automated system puts out suspicious emails without manual checks.
An operating system
The registration order contains comments made by a Apple's work about a specific case that describes how the system found "several child pornography" in user messages.
As part of the complaint to the police force Apple also provided user information: name, address and phone number. Following details, over time, the government has requested complete user activity records.
No doubt Apple cares that the law is implemented within its platforms in every way and always respects the privacy of users in the process. Of course, where there is a crime involved, privacy goes behind as well Communication with authorities is effective and efficient.