Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Eh, I disagree - your definition feels like moving the goalposts.

Apple is under no obligation to host offending content. Check it before it goes in (akin to a security checkpoint in real life, I guess) and then let me move on with my life, knowing it couldn't be arbitrarily vended out to x party.



Going on with your life in this situation means police officers have been given copies of the photos that triggered the checkpoint. Do you want that?


Any image that would trigger _for this hashing aspect_ would already trigger _if you uploaded it to iCloud where they currently scan it already_. Literally nothing changes for my life, and it opens up a pathway to encrypting iCloud contents.


Apple's paper talks about decrypting suspect images. It isn't end to end.[1]

[1] https://www.apple.com/child-safety/pdf/CSAM_Detection_Techni...


Feel free to correct me if I'm wrong, but this is a method for decrypting _if it's matching an already known or flagged item_. It's not enabling decrypting arbitrary payloads.

From your link:

>In particular, the server learns the associated payload data for matching images, but learns nothing for non-matching images.

Past this point I'll defer to actual cryptographers (who I'm sure will dissect and write about it), but to me this feels like a decently smart way to go about this.


Matching means suspect. It doesn't have to be a true match.

It could be worse. But end to end means the middle has no access. Not some access.


And remember the E2EE is pure speculation at this point.


As long as your using an iPhone, apples got access. To be E2E, the screen still needs to be showing the encrypted values, not the real image


> To be E2E, the screen still needs to be showing the encrypted values, not the real image

No that is literally not the definition of end to end encryption.

End to end encryption means that only the final recipients of data can see what the data is. In this case, it's the user.


Then don't offer "E2EE"




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: