zimmie
About
- Username
- zimmie
- Joined
- Visits
- 172
- Last Active
- Roles
- member
- Points
- 2,737
- Badges
- 1
- Posts
- 651
Reactions
-
EU carriers want Apple's Private Relay blocked
dcgoo said:Agree! What is the difference between already existing VPN services and Apple Private Relay?
Part of the problem is people have been conflating "VPN" and "proxy" for over a decade. The overwhelming majority of "VPN" services are actually acting as proxies. They just happen to use VPN technologies for the client-to-proxy leg. Private Relay is also a proxy service, and it's valid to compare it to others. -
Skilled labor shortages could be the next big chip supply problem
ravnorodom said:This is where chip makers need to step in and work with universities or institutions. Many big corporations donate equipments to schools for training, research and hiring after graduation. Establishing mini or virtual chip fabrication lab in University maybe tough but something is needed to be done.
What's really cool is the program also offers early enrollment and dual credit for people still in high school. Spend half your day at the high school, half your day at the college, and you have around 20 hours of college EE credit when you graduate high school. -
New Apple iCloud Private Relay guide details what it doesn't cover
chris-net said:are other browsers or applications like chrome, Firefox, games able to use private relay?
Browsers on macOS are another story. If they use the system's DNS resolver stub, then they get private relay for DNS. If they use their own DNS resolution (like Chrome), they do not get private relay for DNS. That said, the biggest reason some browsers do their own DNS resolution, though, is to use DNS-over-HTTPS, which provides protection from snooping on the local network (but not from snooping by the DNS provider).
If they go through the system APIs for web requests (like URLSession), they should also get private relay for HTTP sites. Most Mac browsers have their own network engines, so they would not get private relay for HTTP sites.
-
Apple wipes on-device CSAM photo monitoring from site, but plans unchanged
exceptionhandler said:zimmie said:exceptionhandler said:badmonk said:I suspect CSAM screening will ultimately be performed and confined iCloud server side, like every other cloud based service has been doing for years (and not talked about it).
I always thought iCloud screened for CSAM, after all MSFT and Google have been doing it for years.
Freedom has its limits.
I see no reason for the move. As some people have previously stated, “maybe Apple is going to e2e encrypt iCloud photos”. The rub here is that it would not be e2e encrypted either way. Scanning and reporting necessitates access to the data. E2E encryption is only E2E encryption IFF there is no process to circumvent it (including at either end) to send the data to someone else outside of the authorized recipients intended by the sender. This very fact alone means that iCloud photos will never be e2e encrypted as Apple needs to do CSAM scanning.
So all things stated, I’m fine with the current state of server side scanning as it’s not on my device and the only way the scanning and reporting applies is IFF you use the service (some may argue that’s the way it would work on device, but that is subject to change, whereas if it’s on the server, they can’t make that change to scan more than what’s sent to iCloud)
To protect against one of those partial directions being used as evidence of possession, they also set the system up to emit fake partial directions which are indistinguishable from real ones until after you have uploaded enough real ones.
The clear solution is to spin all of the iCloud-related functionality out of Photos and into a separate application. CSAM scanning then goes in that application. If you want to upload stuff to iCloud, you need that application, which has the CSAM scanning. If you don't want the CSAM scanning, don't load the application (or remove it if it comes preinstalled). Done. Addresses everybody's concerns.
Right now, Apple employees can view photos you store in iCloud. Presumably they are prohibited from doing this by policy, but they have the technical capability. With the endpoint CSAM scanning as explained in the technical papers Apple presented, they would no longer have that capability. That's because the endpoint CSAM scanning intrinsically involves end-to-end encryption.
We already trust that Apple won't rework their on-device content scanning. Or did you forget what Spotlight and the object recognition in Photos are? Not like you can disable either of those. -
Apple wipes on-device CSAM photo monitoring from site, but plans unchanged
exceptionhandler said:badmonk said:I suspect CSAM screening will ultimately be performed and confined iCloud server side, like every other cloud based service has been doing for years (and not talked about it).
I always thought iCloud screened for CSAM, after all MSFT and Google have been doing it for years.
Freedom has its limits.
I see no reason for the move. As some people have previously stated, “maybe Apple is going to e2e encrypt iCloud photos”. The rub here is that it would not be e2e encrypted either way. Scanning and reporting necessitates access to the data. E2E encryption is only E2E encryption IFF there is no process to circumvent it (including at either end) to send the data to someone else outside of the authorized recipients intended by the sender. This very fact alone means that iCloud photos will never be e2e encrypted as Apple needs to do CSAM scanning.
So all things stated, I’m fine with the current state of server side scanning as it’s not on my device and the only way the scanning and reporting applies is IFF you use the service (some may argue that’s the way it would work on device, but that is subject to change, whereas if it’s on the server, they can’t make that change to scan more than what’s sent to iCloud)
To protect against one of those partial directions being used as evidence of possession, they also set the system up to emit fake partial directions which are indistinguishable from real ones until after you have uploaded enough real ones.
The clear solution is to spin all of the iCloud-related functionality out of Photos and into a separate application. CSAM scanning then goes in that application. If you want to upload stuff to iCloud, you need that application, which has the CSAM scanning. If you don't want the CSAM scanning, don't load the application (or remove it if it comes preinstalled). Done. Addresses everybody's concerns.