wow, you seem to be misinformed. The reporting only happens on iCloud not on your device.It doesn't do on device scanning to turn you in, period.
wow, you seem to be misinformed. The reporting only happens on iCloud not on your device.It doesn't do on device scanning to turn you in, period.
Let me say it like it is: Apple can install and activate whatever system they want with every software update.Regarding iCloud. We have to trust Apple's word the NeuralHash is only activated when logged into iCloud, but since it's happening On-device, it may be running at all times.. Even if it's not, since the system is already in place, it can probably be activated by means of a simple software update..
So can Google, so can Microsoft, so can Amazon and so can Facebook on their platforms these companies can install whatever they want on their platforms.Let me say it like it is: Apple can install and activate whatever system they want with every software update.
I think of pedophiles as sad broken men who sit in dark rooms masturbating over the power they have in abusing defenceless, young, vulnerable children, not as a collective who are striving to bring down a tech company.I see what you mean, but also the converse poses a problem to Apple. Yes, Apple can say that this is a shot across the pedophiles' proverbial bow, but the backlash is also a shot across Apple's bow, that the pedophiles can not only call on, but can rely on. Should Apple revisit this and do it better (which today's news sounds like they are), those pedophiles can easily try to draw the ire of Apple's base and get them pissed off at Apple again all over this, making them reconsider and back down again. Wash/rinse/repeat until Apple gets it right with their base.
So this could go back and forth for who knows how long.
BL.
will you still trust your Mac?
exactly my point.Let me say it like it is: Apple can install and activate whatever system they want with every software update.
It is?!?! <looks at Linux desktop upon which he's typing this, then over at his Linux laptop...> Huh.
lol, you should read what you just said -- no, they don't scan on your device, but yes, it does and uploads it to apple...Neither does Apple. It does match on device, but it's only once it's uploaded to iCloud that reporting can happen.
You're forgetting something, Apple has already ticked off people enough for them to not buy Apple products and they will eventually wander away because the Apple universe doesn't matter to them anymore. Apple's got to cancel this with big fanfare and then wait a long time to get what they've lost back.I see what you mean, but also the converse poses a problem to Apple. Yes, Apple can say that this is a shot across the pedophiles' proverbial bow, but the backlash is also a shot across Apple's bow, that the pedophiles can not only call on, but can rely on. Should Apple revisit this and do it better (which today's news sounds like they are), those pedophiles can easily try to draw the ire of Apple's base and get them pissed off at Apple again all over this, making them reconsider and back down again. Wash/rinse/repeat until Apple gets it right with their base.
So this could go back and forth for who knows how long.
BL.
No, you are the one who's misinformed. The fact that the CSAM scanner is designed to run on end-users' devices is the objection.wow, you seem to be misinformed. The reporting only happens on iCloud not on your device.
Referring to Linux as "a server OS" implies it's suitable only for server use. That is clearly false, as demonstrated by the many people who use it on desktops and laptops. Calling Linux "a server OS" is as inaccurate as calling MS-Windows "a desktop OS" because it's used more on desktops and laptops than in servers.Take a look at how much of a percentage use linux as a server os, 90%+.
Take a look at how much of a percentage use linux as a desktop, <%5.
So yes, linux is a server os, with some hobbyists and programmers who are the 5%.
That will come as news to my co-workers that used it in a business environment.Linux isn't used in 95% of business environments.
Again: That will come as a surprise to my co-workers that used it in a business environment. Including me, who used to use it in a business environment.In business environments you need to be able to work in teams and share file formats between them. And linux is an absolute joke concerning that, ...
Sure:I think you’re conflating the two separate systems. But if not, why don’t you cite the relevant part of the document, then?
NeuralHash is a perceptual hashing function that maps images to numbers. Perceptual hashing bases this number on features of the image instead of the precise values of pixels in the image. The system computes these hashes by using an embedding network to produce image descriptors and then converting those descriptors to integers using a Hyperplane LSH (Locality Sensitivity Hashing) process. This process ensures that different images produce different hashes.
The embedding network represents images as real-valued vectors and ensures that perceptually and semantically similar images have close descriptors in the sense of angular distance or cosine similarity. Perceptually and semantically different images have descriptors farther apart, which results in larger angular distances. The Hyperplane LSH process then converts descriptors to unique hash values as integers.
For all images processed by the above system, regardless of resolution and quality, each image must have a unique hash for the content of the image. This hash must be significantly smaller than the image to be sufficiently efficient when stored on disk or sent over the network.
The main purpose of the hash is to ensure that identical and visually similar images result in the same hash, and images that are different from one another result in different hashes. For example, an image that has been slightly cropped or resized should be considered identical to its original and have the same hash.
The system generates NeuralHash in two steps. First, an image is passed into a convolutional neural network to generate an N-dimensional, floating-point descriptor. Second, the descriptor is passed through a hashing scheme to convert the N floating-point numbers to M bits. Here, M is much smaller than the number of bits needed to represent the N floating-point numbers. NeuralHash achieves this level of compression and preserves sufficient information about the image so that matches and lookups on image sets are still successful, and the compression meets the storage and transmission requirements.
The neural network that generates the descriptor is trained through a self-supervised training scheme. Images are perturbed with transformations that keep them perceptually identical to the original, creating an original/perturbed pair. The neural network is taught to generate descriptors that are close to one another for the original/perturbed pair. Similarly, the network is also taught to generate descriptors that are farther away from one another for an original/distractor pair. A distractor is any image that is not considered identical to the original. Descriptors are considered to be close to one another if the cosine of the angle between descriptors is close to 1. The trained network’s output is an N-dimensional, floating-point descriptor. These N floating-point numbers are hashed using LSH, resulting in M bits. The M-bit LSH encodes a single bit for each of M hyperplanes, based on whether the descriptor is to the left or the right of the hyperplane. These M bits constitute the NeuralHash for the image.
Take a look at how much of a percentage use linux as a server os, 90%+.
Take a look at how much of a percentage use linux as a desktop, <%5.
So yes, linux is a server os, with some hobbyists and programmers who are the 5%.
Linux isn't used in 95% of business environments.
In business environments you need to be able to work in teams and share file formats between them. And linux is an absolute joke concerning that, unless the only thing you do is browse and type text.
Doubtful, many researchers in this or similar fields including those with PhDs and/or professorships who do independent research and have also consulted for authorities and governments (including myself), see this very critical. A former colleague, who is a network and security specialist often tasked with securing forensic digital evidence in CSAM cases has the same opinion and he is much closer to this crap than most.The only people who are getting upset are those who don't understand how this works or are giving into irrational paranoia, fueled by them believing everything they read from fear-mongering bloggers, etc.
Doubtful, many researchers in this or similar fields including those with PhDs and/or professorships who do independent research and have also consulted for authorities and governments (including myself), see this very critical. A former colleague, who is a network and security specialist often tasked with securing forensic digital evidence in CSAM cases has the same opinion and he is much closer to this crap than most.
The argument “you don’t understand it” often comes from those that are not experts in the field, trying to disqualify other opinions. I get this a lot from my students “I got it right, I deserve a better grade, you just didn’t understand what I wrote”.
Apples concern is simple, get the technology out to the market. No one is paid to have concerns over this. Apple also implemented a way for certain processes to bypass the user network stack, so users couldn't block apps from talking back to Apple, leave alone for external firewalls. People had the same doubts about the technology, yet Apple did it. They backpaddled after it became public and removed Apps from the whitelist, but it's still there but inactive at the moment.And you don't think Apple employs or contracts knowledgeable people in the field to implement this technology and advise them on it?
Apples concern is simple, get the technology out to the market. No one is paid to have concerns over this.
You can't credibly assert this with any certainty unless you have insider knowledge.Apples concern is simple, get the technology out to the market. No one is paid to have concerns over this.
That's what's called damage control. People have spoken up and Apple listen (to financial loss). Every company would do it this way. Out of our local research groups and the people I've spoken to, not a single person is willing to put more money into Apple at this point, except for buying "one of each" for research purposes (for various reasons). That's of course only a handful of research institutes locally, but a 6-7 figure sales for Apple they're missing out on every year. We'll see what happens, once this is out.BS. Aside from the fact that they designed this system so carefully as to make it as private as possible, did you not see the article on this site today about them delaying the deployment of this technology to be sure they get it right, amid concerns people have expressed?
So yes. And no, I'm not working at Apple. I have worked with Apple in the late PPC / early Intel days and still know a few people there from visits and projects. Not everyone is happy about this and that's not unusual, in any company. The same can be said for Microsoft, Google and Facebook.You can't credibly assert this with any certainty unless you have insider knowledge.
Sorry, but it can't be both. You either have certain knowledge Apple did not solicit input as to whether there should be concerns related to their proposed solution, or you do not.So yes. And no, ...
That's what's called damage control. People have spoken up and Apple listen (to financial loss).
So yes, I have knowledge about it from people working at Apple.Sorry, but it can't be both. You either have certain knowledge Apple did not solicit input as to whether there should be concerns related to their proposed solution, or you do not.
We have no idea wrt resource consumption. That is one of the many unanswered questions. I can tell you hashing is computationally expensive.... (that also sounds like it'd take up exponentially more system resources).