IreneW
About
- Username
- IreneW
- Joined
- Visits
- 75
- Last Active
- Roles
- member
- Points
- 786
- Badges
- 1
- Posts
- 319
Reactions
-
Security of Quebec vaccine passport app's QR codes questioned
hexclock said:DAalseth said:bonoboextreme said:DAalseth said:That is disconcerting. They are implementing a Vaccine Passport here in BC next month. I hope they use a more secure system. It's sad thought that there are people that will work hard to make themselves a fake VP, or buy one from someone, rather than just getting the shot for free. Reminds me of the people that spend a hundred dollars worth of time and hassle to build a system to save thirty dollars on their taxes. -
Apple has been testing in-screen Touch ID, but it won't be in 'iPhone 13'
-
Researchers who built rudimentary CSAM system say Apple's is a danger
robaba said:rcfa said:The silly exculpatory listing of differences in the systems is useless.
1Did Apple leave the Russian market when Russia demanded the installation of Russian government approved apps? 2Did Apple leave the Russian and Chinese markets, when Russia and China demanded that iCloud servers be located in their countries where government has physical access? 3Did Apple leave the Chinese market, when VPN apps were requested to be removed from the Chinese AppStore? 4Did Apple comply when Russia demanded that Telegram be removed from the Russian AppStore? 5Did Apple leave the UAE when VoIP apps were outlawed there?
NO, NO, NO, NO, NO, and NO!
And NO will be the answer if these countries require additional databases, direct notification (instead of Apple reviewing the cases), etc.
Once this is baked into the OS, Apple has no leg to stand on, once “lawful” requests from governments are coming.
2-Apple is quickly moving to end-to-end encryption with an independent, third party go between which would completely eliminate the threat of Chinese (or Russian, or UAE) access to encrypted files on servers.
3-New security system will be a built in VPN on steroids (end to end encryption, intermediate, independent 3rd part server shielding ID from Webhosts and sniffers, while preventing ISPs from knowing sites visited)
4-don’t know
5-see 3
THIS IS WHY THEY ARE TAKING THE STEP TO SINGLE OUT CSAM NOW—SO THEY CAN STAMP IT OUT, WITHOUT PROVIDING A GATEWAY TO BAD ACTORS, STATE OR PRIVATE ENTERPRISE, WHILE ALLOWING AN UNPRECEDENTED LEVEL OF SECURITY / PRIVACY.
This would be great news, and explain why Apple is implementing on-device CSAM scanning, but has as far as I'm aware never been announced or even hinted at. -
Detect Pegasus malware on iOS for free using admin app iMazing
lkrupp said:So we have a bunch of obsessive, compulsive, irrational users scared to death of Pegasus malware when every security expert says the only people who need to worry about it are those whom a government might want to track. No, your 16 year old nephew isn’t going to use Pegasus to hack your iPhone.
The world _is_ larger than the US, and not even democratic countries are safe from populist regimes running amok...
The last days debate about Apple's image scanning really surprised me, with so many Americans saying "if you haven't done anything wrong, you don't have anything to worry about". While in Europe, where people traditionally have more trust in institutions and government, there is a huge movement and public pressure to keep data private. -
What you need to know: Apple's iCloud Photos and Messages child safety initiatives
Mike Wuerthele said:elijahg said:Mike Wuerthele said:elijahg said:Remember that 1 in 1 trillion isn't 1 false positive per 1 trillion iCloud accounts - it's 1 per 1 trillion photos. I have 20,000 photos, that brings the chances I have a falsely flagged photo to 1 in 50 million. Not quite such spectacular odds then.
And even if it was, one in 50 million is still pretty spectacularly against.
Also, it's massively more likely someone will get their password phished than a hash collision occurring - probably 15-20% of people I know have been "hacked" through phishing. All it takes is a couple of photos to be planted, with a date a few years ago so they aren't at the forefront of someone's library and someone's in very hot water. You claim someone could defend against this in court, but I fail to understand how? "I don't know how they got there" isn't going to wash with too many people. And unfortunately, "good security practices" are practised only by the likes of us anyway, most people use the same password with their date of birth or something equally insecure for everything.
One in a trillion tried a trillion times does not guarantee a match, although it is likely. as you're saying. There may even be two or three. You're welcome to believe what you want, and you can research it with statisticians if you are so inclined. This is the last I will address this point here.
And, in regards to the false positive, somebody will look at the image, and say something like: Oh, this is a palm tree. It just coincidentally collides with the hash. All good. Story over.
In regards to your latter point, this is addressed in the article.