22 C
Dubai
Saturday, December 21, 2024
spot_img

Apple plans to scan US iPhones for child abuse, causing concern-News

[ad_1]

Security researchers say that governments that want to monitor citizens may abuse the system.

Apple’s plan to scan images of child abuse in the US iPhone has aroused applause from child protection organizations, but it has also raised concerns among some security researchers that the system may be abused by governments that want to monitor its citizens.

Apple said its messaging app will use machine learning on the device to warn of sensitive content, without allowing the company to read private communications. The tool Apple calls “neuralMatch” will detect images of known child abuse without the need to decrypt people’s information. If a match is found, the image will be reviewed manually, and law enforcement can be notified if necessary.

But the researchers said the tool could be used for other purposes, such as government surveillance of dissidents or protesters.

Matthew Green of Johns Hopkins University is a top cryptography researcher. He fears that it may be used to frame innocent people by sending them harmless but malicious images that are intended as child abusers. Match objects, fool Apple’s algorithm and warn law enforcement-essentially frame people.

“This is something you can do,” Green said. “Researchers have been able to do this easily.”

Technology companies including Microsoft, Google, Facebook and others have been sharing “hash lists” of known child abuse images for years. Apple has also been scanning user files stored in its iCloud service, which is not as secure and encrypted as its messages, to obtain such images.

The company has been under pressure from the government and law enforcement agencies to allow it to monitor encrypted data. Proposing security measures requires Apple to strike a delicate balance between its high-profile commitment to protecting user privacy while combating child exploitation.

Apple believes that it achieved this feat through a technology developed in consultation with several well-known cryptographers, including Stanford University professor Dan Bonet, who won the Turing Award for his work in this field, often referred to as the technical edition. The Nobel Prize.




[ad_2]

Source link

Related Articles

The UAE’s Cryptocurrency Laws and Investment Possibilities

The UAE's Cryptocurrency Laws and Investment Possibilities Authorities like the Securities and Commodities Authority (SCA) and the UAE Central Bank govern the capital and financial...

What Limits Gamers Face in the UAE

What Limits Gamers Face in the UAE The United Arab Emirates (UAE) has become a growing hub for technology and entertainment. However, when it comes...

UAE Team Emirates Accelerates to New Heights: Landmark Sponsorship with XRG Fuels Future Success

UAE Team Emirates cycling team, renowned for its achievements on the global stage, has announced a groundbreaking six-year sponsorship agreement with the Emirati energy...

Irishman Stuart Quiney Freed from Dubai Jail: Triumph of Advocacy and Safe Return to Dublin

Irishman Stuart Quiney, whose case garnered international attention after he was detained in Dubai over allegations of sending "threatening" emojis, has been released and...

Dubai Stocks Soar to Decade-High: Real Estate and Finance Drive Record Gains

Dubai's stock market has achieved remarkable growth, soaring to its highest levels in over a decade, thanks to strong performances from key sectors such...

Latest Articles