• wyrmroot@programming.dev
    link
    fedilink
    arrow-up
    7
    ·
    16 days ago

    Homomorphic encryption, which allows for analyzing secret data without a decryption step, is actually incredibly cool. It’s a shame the conversation will begin with the fact that they deployed the feature as on by default.

    • ClassifiedPancake@discuss.tchncs.de
      link
      fedilink
      arrow-up
      8
      ·
      16 days ago

      And it’s right that this is the conversation because Apple needs to learn people want to be in control and these things need to be opt-in. They can build the most sophisticated fancy system to protect your privacy, if it’s sending your stuff to another server it needs to ask for permission full stop.

      • tempest@lemmy.ca
        link
        fedilink
        arrow-up
        5
        ·
        16 days ago

        They (and every other tech company) have been doing this type of thing for nearly 20 years. You might see some whinging about it in some corners of the Internet, like here, but most people don’t know or don’t give a shit.

        It sucks.

    • t3rmit3@beehaw.org
      link
      fedilink
      arrow-up
      3
      ·
      16 days ago

      It allows processing data without decrypting it, which is great in terms of preventing someone else from snooping on it, but doesn’t change that Apple is retaining the ability to analyze the data content, which is the actual issue here.

      • Scrubbles@poptalk.scrubbles.tech
        link
        fedilink
        English
        arrow-up
        2
        ·
        16 days ago

        Reading between the lines, I guarantee they’re doing the same thing for CSAM protection. I think sex offenders caused this to happen, I believe they found out that they were using photos to host that horrid stuff, and apple can’t just ignore it, so I think we have them to thank

        • t3rmit3@beehaw.org
          link
          fedilink
          arrow-up
          2
          ·
          16 days ago

          I would be interested to see what lines you read between, because “identifying landmarks and points of interest” doesn’t sound like anything capable of identifying CSAM. I think you’re giving a big corporation a bunch of credit there is no reason to suspect it is owed, for an excuse they never professed.

      • wyrmroot@programming.dev
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        16 days ago

        This is not the case, but I do still disagree with the “trust me bro” approach to a feature rollout that does send data your somewhere, encrypted or not.

        Edit: For those interested, the reason it’s not the same as a backdoor is that the result of the computation done on HE data is itself still encrypted and readable only by the original owner. So you can effectively offload the work of a certain analysis to a server that you don’t actually trust with your keys.

        • P03 Locke@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          0
          ·
          16 days ago

          readable only by the original owner

          Right now it’s not. All encryption gets its back broken by security flaws and brute force mathematics.