oriXone

This is how Apple got its child abuse pictures on iCloud

abuse, Apple, Child, iCloud, pictures


Apple's security

Or to avoid It is an important task for Apple, this not only works when talking to its consumers, but it is increasingly specific and includes policies to avoid hurting innocent people. As confirmed by Apple's director of privacy, during the CES 2020 held in Las Vegas, the company used adoption technology to detect illegal images.

Although Apple has not entered into the algorithms it has used to implement the awareness game about its content, a release order issued in the name of Home Security investigations has given the impression that how Apple detects and reports child pornography uploaded to iCloud or sent through your email servers.

Apple gets child abuse pictures on iCloud

According to information published from 9to5mac the company takes a automatic update, the same is true of most technology companies. Each image is identified by a digital signature or a hash and is updated to match the images in the same pattern.

According to a statement made from Homeland Security Investigations to Forbes, when a photo is found, the next step is to contact the relevant authorities and that in the United States, the National Center for Missing and Exploited Children. However, prior to this interaction, it is known that Apple made a book verification, and only then provide law enforcement agencies with the name, address and telephone number associated with the corresponding Apple ID.

According to an Apple employee's comment, which is not a site that explores this type of imagery, this validation was first made from the moment the first iCloud user uploaded "Several child pornographic images of alleged children". At the same time, he pointed out that Apple only monitors images compared to the known image hash, so there should be a very low risk of Apple cracking and viewing innocent images and ensuring hash error protection.

This process ensures that Apple is very careful your customer information, but does not stop operating before criminal considerations, so it has a defined mechanism for reducing the risk of false positives.



Leave a Comment