Apple says researchers can test a child’s safety. It blames the initiation that does the same thing.

[ad_1]
Apple may provide the code to be reviewed – although this is not what it said it would do. Researchers may also attempt to modify the machine in a “non-invasive” way – that is, not run the software in a live environment.
In fact, both of these options have one common denominator: It does not allow you to look at the number used on the latest iPhone to see how it works in the wild. On the contrary, the methods continue to be trusted not only because Apple is open and honest, but also that it has written its number without any errors or reviews.
Another option would be to give Apple a chance to use the security app to verify the company’s claims. But the team, made up of researchers outside of Apple, is the only, compressed program with a lot of rules on what researchers can say or do that doesn’t solve the problem of trust.
This leaves only two options for searchers who want to look inside iPhones for this feature. First, hackers can damage old iPhones by using the risk of zero days. It is compact, inexpensive, and can be closed with a security patch.
“Apple has spent a lot of money trying to stop people from making phone calls,” explains Thiel. “They have hired people from prisons to make it more difficult.”
Or the explorer could use an iPhone that could turn off Apple’s security. In practice, this means Corellium.
There are also limits to what each researcher can see, but the researcher can see if the scan is going outside of shared photos on iCloud.
However, if non-child-friendly items are stored, they may not be visible to researchers. To answer that question, Apple says it needs two different child protection organizations in each area so that they all have the same CSAM image in their respective areas. But it did not say much about how it would work, who would run the barns, who would participate, and where the sources would be located.
Thiel points out that the problem of child abuse that Apple is trying to tackle is real.
“It’s not just a fantasy,” Thiel said.
But, says Corellium’s Tait, Apple is trying to shut it down at once and make it public.
“Apple’s software is trying to bake their own bread and they will eat it too,” said Tait, a British security expert at GCHQ.
“With their left hand, they make the prison crisis even more difficult and accuse companies like Corellium of being unavailable. any security detective can do this on their own. ‘”
“I’m sitting here thinking, what do you mean you can do this? You have made your machine impossible. The only reason people can achieve this is you, not because of you. ”
Apple did not respond to a request for comment.
[ad_2]
Source link



