This isn’t like an anti-virus system. You can’t just catalog them all. It’s too easy to create. Hell, with the advent of LLMs and AI-generated images, it’s going to be even easier to create.
It sounds like they have a database of CSAM images, so they’re likely hashing parts of the suspected image or video and searching for that hash in the database
p03locke@lemmy.dbzer0.com 1 year ago
EvilBit@lemmy.world 1 year ago
Too easy to create and too easy to foil the hash, unless it’s some kind of highly sophisticated feature-based hashing.
bernieecclestoned@sh.itjust.works 1 year ago
Right, so I guess the software is doing that prior to it being encrypted and sent.
Is the problem that it could do more than just scan for CSAM, ie. Anything that the government, or dictator, decides?
ultranaut@lemmy.world 1 year ago
That’s exactly the risk. There’s no way to implement this type of client side scanning without building infrastructure that can then also be used to scan for other things.
bernieecclestoned@sh.itjust.works 1 year ago
Got it. Thanks!