Comment on Apple ordered to open encrypted user accounts globally to UK spying
towerful@programming.dev 4 weeks agoMy experience of checksums are in things like serial where they can potentially recover a corrupt bit.
I presume in the case of encryption, a checksum is more of a hash of the raw data? Like a one-way deterministic compute. Easy to get a hash of data, extremely difficult to get data from a hash.
In which case, it’s fine. Passwords are hashed (granted, multiple times), but a cryptographically secure hash is not to be underestimated.
Pika@sh.itjust.works 4 weeks ago
You are correct, my issue with it isn’t retrieving the data however, its the possibility that if the person involved had the means to, they could have a table of check-sums of files of interest. This system could be used to confirm or deny a file of interest is present on the device.
For the everyday person this is a non-issue, but from a privacy POV you should not be able to get any information in regards to what a file is.