678
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 14 Oct 2023
678 points (100.0% liked)
Privacy
32013 readers
1008 users here now
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
Chat rooms
-
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
founded 5 years ago
MODERATORS
The way I intend client-side is that ideally the client would have the CP hashes built in and would only trigger on a hash match, that is, when it’s 100% sure that your picture is ID’d.
The problem I have is that if it’s server side it’s indeed a horrible privacy violation, if it’s client side it’s trivial to bypass through some decompiled version of the app - so there is no good way to sell this.
We’re splitting hairs here, I agree with you generally speaking.
Yes. But the government can provide an "updated" hash database. Such updates would be frequent. There is no way for whatsapp to know what files were used to make those updated hashes. Unless the government distributes copies of the underlying CSAM to the messenger app providers which kinda goes against supposedly trying to stop the proliferation of CSAM in the first place.