Apple doesn't scan photos for child pornography, but Mail does

Lately the controversy has fallen like a slab on the offices of the Cupertino company, the reason is the csam, as the tracking that technology companies carry out of their services in search of child pornography in order to protect potential victims is known.

Apple warns that its child pornography tracking protocol doesn't work in iCloud Photos but has been in Mail for years. In fact, it is a practice that many other companies already carry out and it does not seem to have raised any blister during these past times, what is happening with the CSAM protocols?

In fact, Apple has confirmed that it has been scanning the content of iCloud Mail for at least three years in search of child pornography and for security reasons, something that, for example, Google has done for many years in Gmail. However, they have seen fit to clarify that this "scanning" system is not being carried out (for the moment) on iCloud photos.

Either way, this "crawl" It does not affect the photographs that are stored in the physical memory of our device, but only in those that go through the iCloud servers or are sent through Mail.

Apple uses image search and analytics technology to find and report child abuse content. Our system uses advanced electronic signatures.

This tells us little to nothing about how Apple's scanning system works, however, unless you are a participant in this type of criminal activity, What's the problem with an algorithm identifying child pornography on Apple's servers? Meanwhile, controversy continues to be the order of the day regarding this issue that seems to be of great concern in the United States of America.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.