- Aug 7, 2004
I'm guessing you don't understand how HTTPS works. Beyond the metadata of the traffic, which Apple is now stripping as part of this service, they have no access to the content. They'd have to steal the TLS private keys from whatever server you're communicating with to decrypt the message contents.Fwiw there are some alternatives right now for anyone who is already looking to jump ship but still wants a smartphone.
GrapheneOS on a Pixel is probably the closest you’ll get to regular smartphone capabilities. https://grapheneos.org/
/e/ is another option. https://e.foundation/
there’s also Ubuntu touch. https://ubuntu-touch.io/
they all come with compromises.
Yikes. I hadn’t heard about that one. Just funnel all your internet traffic through their servers too, they’re obviously interested in preserving your privacy, and certainly not fingerprinting your information for later.
I think Apple needs to be using clear language about it.
they’ve stated they’re putting a database on your device that the fingerprinting will use as a reference.
it’s creating a ”hash” that it will compare to known bad ones using some fuzzy logic.
just because it doesn’t do anything with the report afterwards (unless the photo is uploaded to iCloud) doesn’t make it okay for them to be digging through your stuff.
Further, if Apple wanted to steal your information, they'd do so on the phone itself, they wouldn't need to wait for you to pass it through their relay. This is quite literally why this child porn detection thing has the scanning being done on the device itself to generate the ticket.
Anyways, have fun with your compromises. I'll be enjoying the fact that all my webtraffic on my phone can no longer be tracked by my ISP & other advertising agencies since i've got a double encrypted tunnel going out a cloud relay. (First hop to Apple, second/message content HTTPS encrypted anyways)