Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Apple's paper talks about decrypting suspect images. It isn't end to end.[1]

[1] https://www.apple.com/child-safety/pdf/CSAM_Detection_Techni...



Feel free to correct me if I'm wrong, but this is a method for decrypting _if it's matching an already known or flagged item_. It's not enabling decrypting arbitrary payloads.

From your link:

>In particular, the server learns the associated payload data for matching images, but learns nothing for non-matching images.

Past this point I'll defer to actual cryptographers (who I'm sure will dissect and write about it), but to me this feels like a decently smart way to go about this.


Matching means suspect. It doesn't have to be a true match.

It could be worse. But end to end means the middle has no access. Not some access.


And remember the E2EE is pure speculation at this point.


As long as your using an iPhone, apples got access. To be E2E, the screen still needs to be showing the encrypted values, not the real image


> To be E2E, the screen still needs to be showing the encrypted values, not the real image

No that is literally not the definition of end to end encryption.

End to end encryption means that only the final recipients of data can see what the data is. In this case, it's the user.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: