Forgot your password?
typodupeerror

Submission + - We Built a CSAM System Like Apple's - The Tech Is Dangerous (washingtonpost.com)

An anonymous reader writes: Earlier this month, Apple unveiled a system that would scan iPhone and iPad photos for child sexual abuse material (CSAM). The announcement sparked a civil liberties firestorm, and Apple’s own employees have been expressing alarm. The company insists reservations about the system are rooted in “misunderstandings.” We disagree.

We wrote the only peer-reviewed publication on how to build a system like Apple’s — and we concluded the technology was dangerous. We’re not concerned because we misunderstand how Apple’s system works. The problem is, we understand exactly how it works.

Our research project began two years ago, as an experimental system to identify CSAM in end-to-end-encrypted online services. As security researchers, we know the value of end-to-end encryption, which protects data from third-party access. But we’re also horrified that CSAM is proliferating on encrypted platforms. And we worry online services are reluctant to use encryption without additional tools to combat CSAM.

We sought to explore a possible middle ground, where online services could identify harmful content while otherwise preserving end-to-end encryption. The concept was straightforward: If someone shared material that matched a database of known harmful content, the service would be alerted. If a person shared innocent content, the service would learn nothing. People couldn’t read the database or learn whether content matched, since that information could reveal law enforcement methods and help criminals evade detection.

But we encountered a glaring problem.

Our system could be easily repurposed for surveillance and censorship. The design wasn’t restricted to a specific category of content; a service could simply swap in any content-matching database, and the person using that service would be none the wiser.

Submission + - New syscall enables secret memory even the kernel can't read to Linux 5

RoccamOccam writes: After many months of development, the memfd_secret() system call was finally merged for the upcoming 5.14 release of Linux. There have been many changes during this feature's development, but its core purpose remains the same: allow a user-space process to create a range of memory that is inaccessible to anybody else — kernel included. That memory can be used to store cryptographic keys or any other data that must not be exposed to others. Reportedly, it is even safe from processor vulnerabilities like Spectre because secret memory is uncached mapped.

Submission + - SPAM: OnlyFans to Block Sexually Explicit Videos Starting in October

An anonymous reader writes: OnlyFans is getting out of the pornography business. The company will prohibit users from posting any sexually explicit conduct, starting in October. Creators will still be allowed to post nude photos and videos, provided they’re consistent with OnlyFans’ policy, the company said Thursday. The changes are needed because of mounting pressure from banking partners and payment providers, according to the company. “In order to ensure the long-term sustainability of our platform, and the continue to host an inclusive community of creators and fans, we must evolve our content guidelines,” OnlyFans said.

OnlyFans has attracted more than 130 million users by giving online creators a platform to charge their fans for photos and videos. Many of its most-popular creators post nude photos and videos, and it has been praised for giving sex workers a safer place to do their jobs. But sex work still has a stigma. And OnlyFans is trying to raise money from outside investors at a valuation of more than $1 billion. The company handled more than $2 billion in sales last year, and is on pace to more than double that this year. It keeps 20% of that figure.

Link to Original Source

Slashdot Top Deals

Base 8 is just like base 10, if you are missing two fingers. -- Tom Lehrer

Working...