Pricefield | Lemmy
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
@[email protected] to Privacy [email protected]English • 2 years ago

Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy

www.wired.com

external-link
message-square
48
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
172
external-link

Apple’s Decision to Kill Its CSAM Photo-Scanning Tool Sparks Fresh Controversy

www.wired.com

@[email protected] to Privacy [email protected]English • 2 years ago
message-square
48
fedilink
  • cross-posted to:
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
  • [email protected]
Child safety group Heat Initiative plans to launch a campaign pressing Apple on child sexual abuse material scanning and user reporting. The company issued a rare, detailed response on Thursday.
  • phillaholic
    link
    fedilink
    English
    1•2 years ago

    You’re thinking of Google, where they data mine you as their primary business model. Google Photos scan your photos for object recognition, what do you think that is? There’s no E2E there at all. Apple’s object detection is done on device. It amazes me that Apple got attacked about this when literally everyone else is just doing it without telling you and not offering encryption.

    • @[email protected]
      link
      fedilink
      English
      1•
      edit-2
      2 years ago

      deleted by creator

      • TuxOnBike
        link
        fedilink
        1•2 years ago

        @player2

        Google already did that: https://www.theverge.com/2022/8/21/23315513/google-photos-csam-scanning-account-deletion-investigation

        @phillaholic

        • @[email protected]
          link
          fedilink
          English
          1•2 years ago

          deleted by creator

Privacy [email protected]

[email protected]
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

  • Subscribe on Kbin.social
  • Subscribe on Lemmy.one
  • Subscribe on Lemmy.ml
  • Subscribe on Beehaw.org

Learn more…


Check out our website at privacyguides.org before asking your questions here. We’ve tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the “official” Privacy Guides community on Lemmy, which can be verified here. Other “Privacy Guides” communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don’t ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don’t repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don’t abuse our community’s willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

  • EFF: Surveillance Self-Defense
  • Consumer Reports Security Planner
  • Jonah Aragon (YouTube)
  • r/Privacy
  • Big Ass Data Broker Opt-Out List
  • 1 user / day
  • 1 user / week
  • 4 users / month
  • 612 users / 6 months
  • 2 subscribers
  • 717 Posts
  • 10.6K Comments
  • Modlog
  • mods:
  • @[email protected]
  • @[email protected]
  • @[email protected]
  • @[email protected]
  • @[email protected]
  • UI: 0.18.4
  • BE: 0.18.2
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org