Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That was explained in the original design. Each possible match would count, let’s call it a “point”.

Once you reached a certain threshold (the number was not given) it would trigger an alert in a system at Apple.

Each report contained a bit of data that wasn’t enough to identify someone. Once enough “points” from one account accumulated they’d have enough to identify who you were, which files matched, and presumably the full decryption key.

I believe the plan was the suspect files would be decrypted and compared against the real CSAM signatures. If a close match was found it would be sent to NCMEC for confirmation and law enforcement actions.

The threshold was to prevent false positives from the perceptual hashes, like the Google AI scanning incident. Reportedly nobody has one or two pictures. People with CSAM tend to have a lot, so they’d show up “bright red”. They probably didn’t want to reveal the number so people wouldn’t try to keep only that many pictures on their phone to avoid detection.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: