Podcasts about child sexual abuse material csam

  • 30PODCASTS
  • 32EPISODES
  • 44mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Aug 12, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about child sexual abuse material csam

Latest podcast episodes about child sexual abuse material csam

ITSPmagazine | Technology. Cybersecurity. Society
Blocking Billions to Secure the Internet | A Brand Story Conversation From Black Hat USA 2024 | A DNSfilter Story with TK Keanini | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 12, 2024 17:46


During Black Hat USA 2024 in Las Vegas, Sean Martin engages in a Brand Story conversation with TK Keanini from DNSFilter to explore the pivotal role DNSFilter plays in safeguarding networks around the world. DNSFilter operates by leveraging the Domain Name System (DNS), an essential component of the internet. As TK Keanini shares, the company's primary mission is to filter out malicious traffic and allow legitimate traffic to pass through, thereby providing an effective layer of security that is both accessible and user-friendly.The applicability of DNSFilter spans globally, reflecting the nature of cyber threats, which are not confined by geographic borders. One critical aspect discussed is DNSFilter's ability to manage approximately 130 billion DNS requests daily, blocking between three to four billion potentially harmful requests. This impressive scale underscores the importance of DNSFilter in preventing cyberattacks and protecting users from inadvertently accessing malicious sites.From coffee shops to large enterprises, the relevance and ease of deploying DNSFilter stand out. For businesses, the practical uses of DNSFilter are numerous.Keanini explains that the technology is effortless to set up and can be integrated directly into various levels of IT infrastructure, including Wi-Fi routers in coffee shops and public Wi-Fi in retail settings. This straightforward setup enables even those with minimal technical expertise to implement robust cybersecurity measures easily.The conversation also highlights DNSFilter's effectiveness in addressing global issues, such as Child Sexual Abuse Material (CSAM), reinforcing the company's commitment to making the internet safer for everyone. The firm's blocking capabilities are not limited to phishing and ransomware; they extend to other harmful content categories, ensuring comprehensive protection.Moreover, for Chief Information Security Officers (CISOs) and organizations with established cybersecurity programs, DNSFilter offers an invaluable addition to their security suite. With DNSFilter, policies can be set with a single click, streamlining the process for schools, businesses, and managed service providers alike. Keanini points out that this level of usability ensures that even those without extensive cybersecurity experience can effectively manage and implement necessary protections.Additionally, Keanini emphasizes the importance of DNSFilter's role in protecting everyday users on public Wi-Fi networks and its affordability for public-use scenarios. DNSFilter's technology integrates smoothly into existing security frameworks, providing peace of mind to users and IT administrators that their networks are secure. For individuals and organizations looking to enhance their online security, DNSFilter presents a compelling solution. With its easy setup, global reach, and comprehensive protection against a wide range of cyber threats, DNSFilter stands as a vital tool in the arsenal of modern cybersecurity solutions.Learn more about DNSFilter: https://itspm.ag/dnsfilter-1g0fNote: This story contains promotional content. Learn more.Guest: TK Keanini, CTO, DNSFilter [@DNSFilter]On LinkedIn | https://www.linkedin.com/in/tkkeaninipub/ResourcesLearn more and catch more stories from DNSFilter: https://www.itspmagazine.com/directory/dnsfilterView all of our Black Hat USA  2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Blocking Billions to Secure the Internet | A Brand Story Conversation From Black Hat USA 2024 | A DNSfilter Story with TK Keanini | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later Aug 12, 2024 17:46


During Black Hat USA 2024 in Las Vegas, Sean Martin engages in a Brand Story conversation with TK Keanini from DNSFilter to explore the pivotal role DNSFilter plays in safeguarding networks around the world. DNSFilter operates by leveraging the Domain Name System (DNS), an essential component of the internet. As TK Keanini shares, the company's primary mission is to filter out malicious traffic and allow legitimate traffic to pass through, thereby providing an effective layer of security that is both accessible and user-friendly.The applicability of DNSFilter spans globally, reflecting the nature of cyber threats, which are not confined by geographic borders. One critical aspect discussed is DNSFilter's ability to manage approximately 130 billion DNS requests daily, blocking between three to four billion potentially harmful requests. This impressive scale underscores the importance of DNSFilter in preventing cyberattacks and protecting users from inadvertently accessing malicious sites.From coffee shops to large enterprises, the relevance and ease of deploying DNSFilter stand out. For businesses, the practical uses of DNSFilter are numerous.Keanini explains that the technology is effortless to set up and can be integrated directly into various levels of IT infrastructure, including Wi-Fi routers in coffee shops and public Wi-Fi in retail settings. This straightforward setup enables even those with minimal technical expertise to implement robust cybersecurity measures easily.The conversation also highlights DNSFilter's effectiveness in addressing global issues, such as Child Sexual Abuse Material (CSAM), reinforcing the company's commitment to making the internet safer for everyone. The firm's blocking capabilities are not limited to phishing and ransomware; they extend to other harmful content categories, ensuring comprehensive protection.Moreover, for Chief Information Security Officers (CISOs) and organizations with established cybersecurity programs, DNSFilter offers an invaluable addition to their security suite. With DNSFilter, policies can be set with a single click, streamlining the process for schools, businesses, and managed service providers alike. Keanini points out that this level of usability ensures that even those without extensive cybersecurity experience can effectively manage and implement necessary protections.Additionally, Keanini emphasizes the importance of DNSFilter's role in protecting everyday users on public Wi-Fi networks and its affordability for public-use scenarios. DNSFilter's technology integrates smoothly into existing security frameworks, providing peace of mind to users and IT administrators that their networks are secure. For individuals and organizations looking to enhance their online security, DNSFilter presents a compelling solution. With its easy setup, global reach, and comprehensive protection against a wide range of cyber threats, DNSFilter stands as a vital tool in the arsenal of modern cybersecurity solutions.Learn more about DNSFilter: https://itspm.ag/dnsfilter-1g0fNote: This story contains promotional content. Learn more.Guest: TK Keanini, CTO, DNSFilter [@DNSFilter]On LinkedIn | https://www.linkedin.com/in/tkkeaninipub/ResourcesLearn more and catch more stories from DNSFilter: https://www.itspmagazine.com/directory/dnsfilterView all of our Black Hat USA  2024 coverage: https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cyber Synapse Podcast
Talking about CSAM: Guest interview on scrolling-to-death podcast

Cyber Synapse Podcast

Play Episode Listen Later Apr 22, 2024 57:10


Disclaimer: This conversation discusses child sexual abuse material. Please listen or watch with caution. This is a conversation that no one wants to have, but everyone should be having. It's about Child Sexual Abuse Material (CSAM). Cath Knibbs joins Nicki today on Scrolling 2 Death to educate parents on what is happening with our childrens' photos online. You'll get a basic understanding of the risks and how to avoid them. I cannot stress the importance of understanding the landscape of CSAM in today's world. Cath is an Online Harms Consultant, Trainer, Speaker, Author and Psychotherapist. Learn more about her work at: https://www.childrenandtech.co.uk or on IG @catherine_knibbs and TikTok @cath_knibbs. If you think a child may be at immediate risk of abuse, call 999 (UK) 911 (US) or your local police. If you would like to report CSAM, review the following resources. United States: Organization to contact: National Center for Missing and Exploited Children. Website: report.cybertip.org/ Phone number: 1-800-THE-LOST (1-800-843-5678) Globally: https://report.iwf.org.uk/org/

Scrolling 2 Death
What Parents Need To Know About CSAM (with Cath Knibbs)

Scrolling 2 Death

Play Episode Listen Later Mar 28, 2024 50:46


Disclaimer: This conversation discusses child sexual abuse material. Please listen or watch with caution.  This is a conversation that no one wants to have, but everyone should be having. It's about Child Sexual Abuse Material (CSAM). Cyber trauma expert Cath Knibbs joins me today on Scrolling 2 Death to educate parents on what is happening with our childrens' photos online. You'll get a basic understanding of the risks and how to avoid them. I cannot stress the importance of understanding the landscape of CSAM in today's world.  This topic is horrible. It's icky. It's extremely difficult to hear about. But the truth is that there are hundreds of millions of CSAM photos and videos being shared, traded and sold…content that is either self-generated by the children or stolen from parents' social media posts.  As a parent, I want to know what's happening with CSAM in order to protect my children from CSAM. Hopefully you'll join me in educating yourselves, as well.  Cath is an Online Harms Consultant, Trainer, Speaker, Author and Psychotherapist. Learn more about her work at: https://www.childrenandtech.co.uk or on IG @catherine_knibbs and TikTok @cath_knibbs. ***If you think a child may be at immediate risk of abuse, call 911 or your local police. If you would like to report CSAM, review the following resources. United States: Organization to contact: National Center for Missing and Exploited Children. Website: report.cybertip.org/  Phone number: 1-800-THE-LOST (1-800-843-5678) Globally:  https://report.iwf.org.uk/org/ Stat Clarification: NCMEC's CyberTipline received 32 million reports in 2022, resulting in 80 million pieces of content.

Legally Speaking
ICAC and AI-Generated CSAM

Legally Speaking

Play Episode Listen Later Mar 28, 2024 13:07


The Internet Crimes Against Children Task Force has observed a new form of evidence: Computer generated Child Sexual Abuse Material (CSAM). Artificial Intelligence (AI) is commonly used to generate illegal images of children in sexual situations, similar to animated CSAM images. Listen as Sete Aulai, our ICAC Commander, speaks out about this evolving trend. This is occurring at a time when ICAC continues to receive tips, cases, and explicit images, as well as attempts by some suspects to contact live young people.

Scrolling 2 Death
The Current State of Sharing Our Kids Online

Scrolling 2 Death

Play Episode Listen Later Feb 29, 2024 13:23


It's time for a fresh discussion about sharing our kids online. AKA #Sharenting  Parents everywhere continue to share, despite the growing risks.  In this episode, I break down the current state of sharenting in today's digital era, including; the risks of CSAM and AI-generate deep fake nudes, the short-term and long-term effects on our children, an analysis of why we share and thoughts around how our sharing can effect other parents.  A takeaway for today:  *Child Sexual Abuse Material (CSAM) refers to any content that depicts sexually explicit activities involving a child. This was previously referred to as "child pornography." As pornography implies consent, this term is no longer appropriate to use in reference to children. 

ai sharing current state kids online child sexual abuse material csam
Libertas International Podcast
10-My First Case- Project Capotillo

Libertas International Podcast

Play Episode Listen Later Nov 9, 2023 19:50


Trigger Warning!-The following podcast contains details of disturbing sexual abuse of children, listener discretion is advised. Tyler details on this podcast the first human trafficking/CSAM case that he ever worked. It occurred in the Dominican Republic where a mother was selling her two daughters on a Facebook group and receiving payment in Crypto Currency. The podcast goes into detail of what Tyler had to do to get the children quality aftercare and how bunny rabbits were the thing that provided a way for the survivors to one day leave a life of poverty and create something self sustaining and healing.CSAM has become a growing crime in the world only made worse by the advancement of technology and the global pandemic. Child Sexual Abuse Material (CSAM) vs. child pornographySometimes CSAM is referred to as child pornography. However, the term “child pornography” should be avoided for the following reasons: The term child pornography fails to describe the true nature of the material and undermines the seriousness of the abuse from the child's perspective.  Pornography is a term primarily used to describe material depicting adults engaged in consensual sexual acts distributed for the purposes of sexual pleasure. Using this term in the context of children risks normalizing, trivializing and even legitimizing the sexual abuse and exploitation of children. Child pornography implies consent, and a child cannot legally give consent.  The term child pornography is still used in legislation in some countries. For this reason, CSAM is sometimes referred to as child pornography for legal purposes. In non-legal contexts, such as in media publications, the term Child Sexual Abuse Material (CSAM) should be usedWho are the victims?According to a study from ECPAT: 56.2% of cases depicted were prepubescent children. 25.4% were pubescent children. 4.3% were very young children (infants and toddlers). 14.1% of cases featured children in multiple age categories. The younger the victim, the more severe the abuse was likely to be. 84.2% of videos and images contained severe abuse. The US Now Hosts More Child Sexual Abuse Material than any Other CountryTo support the work of Libertas International please visit libertasfreedom.org To read more about what is CSAM and how to combat it, please visit the following link. https://rm.coe.int/fighting-csam-inhope/16809ede03

The CAPE Podcast
Episode 13 - The battle to protect your kids online with Sergio Zaragoza

The CAPE Podcast

Play Episode Listen Later Oct 4, 2023 68:41


Content Warning - Discussions about Child Sexual Abuse, Online Child Exploitation and Child Sexual Abuse Material Episode 13 - The battle to protect your kids online with Sergio Zaragoza In this episode, Kristi interviews Sergio Zaragoza, an advocate and online child exploitation educator living in Spain. Sergio worked as an investigator and moderator for big tech companies YouTube and Google among other social media companies where he was exposed to Child Sexual Abuse Material (CSAM) for over 5 years, classifying content. Sergio offers his experiences to listeners as someone who saw 1000s of videos and images of child sexual abuse material and observed grooming and sextortion via the platforms he was moderating/classifying and the surge in Computer Generated CSAM (AI). There is a battle going on between law enforcement, child safety and online safety advocates and educators, parents, big tech companies and legislators in this space and during this conversation, Kristi & Sergio discuss the loop holes and what parents need to know in this fight to keep our kids safe. This is a real conversation about the truth of child sexual abuse material, sextortion, self-generated child sexual abuse and computer generated CSAM. You can connect with Sergio on LinkedIn here: https://www.linkedin.com/in/sergio-zaragoza-752680201/ If any part of this discussion was upsetting or overwhelming, please check out the resources on our website for support: www.cape-au.com. Please reach out to Kristi via email on admin@cape-au.com.

Tanvir Talks
RERUN - #26 Apple scans your iCloud Photos

Tanvir Talks

Play Episode Listen Later Sep 16, 2022 26:33 Transcription Available


Programming Note: I am travelling for work so I am re-running a previous episode. This is the episode where we layout the plans for Apple scan your iCloud photos for Child Sexual Abuse Material (CSAM). This is off the back of Google recently shutting down a Google account of someone who was accused of having CSAM, but it turned out he didn't. ------------------------------------------------------------------------------- Apple searching your iCloud photos Apple has come under fire recently because of their new machine learning they're adding to identify Child Sex Abuse Material. What are Apple trying to do? Are they looking into your phone and creating a backdoor? Why are people against this? Ehsan and I discuss. Thank you for listening! Read my latest blog post here Click here to subscribe to this podcast on Apple, Google, Spotify, or wherever you get your podcasts.

Marisol Nichols Podcast
Human Traffickers & Technology w/ Tim Ballard

Marisol Nichols Podcast

Play Episode Listen Later Aug 31, 2022 33:47


In this Episode # 08, Tim Ballard, founder of Operation Underground Railroad, is back in the studio to talk about the technology & tactics used by human traffickers and predators to groom and exploit children. If you or someone you know have children playing games online or using social media, this is an episode you don't want to miss! Tim Ballard (@timballard89) has gone undercover in the U.S. & abroad to successfully infiltrate dozens of child trafficking organizations while rescuing countless women & children from human traffickers and pedophiles. Prior to founding Operation Underground Railroad, he spent more than a decade working as a Special Agent for the U.S. Department of Homeland Security assigned to the Internet Crimes Against Children (ICAC) Task Force deployed as an undercover operative for the U.S. Child Sex Tourism Jump Team.  Tim is an expert at managing Dark Web investigations where pedophiles and traffickers trade Child Sexual Abuse Material (CSAM). He has trained hundreds of law enforcement professionals and has testified before the U.S. Congress on best practices to liberate children from sex slavery.  #JoinTheFight #EndHumanTrafficking #StopHumanTrafficking  Connect with Tim Ballard: Twitter: https://twitter.com/timballard Facebook: https://www.facebook.com/officialtimballard Instagram: https://www.instagram.com/timballard89 O.U.R. Website: https://www.ourrescue.org Facebook: https://www.facebook.com/OURrescue Instagram: https://www.instagram.com/ourrescue Like the show? We appreciate your positive reviews and comments. FOLLOW MARISOL: Podcast → https://marisolnichols.com/podcast  Website → https://marisolnichols.com/  Facebook → https://www.facebook.com/marisolnichols  Instagram → https://www.instagram.com/marisolnichols  TikTok → https://www.tiktok.com/@realmarisolnichols Twitter → https://twitter.com/marisolnichols  BUSINESS/SPONSORS/INQUIRIES ↳ Info@MarisolNichols.com  Learn more about your ad choices. Visit megaphone.fm/adchoices

The Pivot
Child Sexual Abuse Material & How to Investigate CSAM

The Pivot

Play Episode Listen Later May 19, 2022 77:14


Homeland Security Investigations (HSI), the investigative unit of Immigration and Customs Enforcement (ICE), announced it initiated 4,224 child exploitation cases during the 2019 fiscal year, which began in October 2018 and concluded at the end of September. Those cases led to a total of 3,771 criminal arrests, and the identification or rescue of 1,066 victims. In this episode, The Pivot hosts and Maltego Subject Matter Experts Joe Ryan and Mario Rojas dive into the alarming topic: Child Sexual Abuse Material (CSAM) and how investigators and organizations can support the fight against it. They touch upon the following topics: 1. What technologies are involved in the production, identification, and detection of CSAM 2. Recent headlines that have to do with CSAM 3. How CSAM is investigated 4. What other types of CSAM are out there and where we can find information or reports about CSAM 5. How to prevent the spread of CSAM or get involved in the fight against CSAM ■ About The Pivot Brought to you by Maltego, The Pivot deep dives into topics pivoting from information security to the criminal underground. Each episode features interviews with experts from the industry and research fields and explores how they connect the dots. ■ About Maltego Used by investigators worldwide, Maltego is an graphical link analysis tool that allows users to mine, merge, and map data from OSINT and third-party data integrations for all sorts of investigations—cybersecurity, person of interest, fraud, and more. The podcast streams free on Spotify. You can also watch it all go down on YouTube. Don't forget to subscribe to our Twitter and LinkedIn to stay on top of our latest updates, tutorials, webinars, and deep dives. For more information about Maltego, visit our website.

Tanvir Talks
#36 - New Samsung Phones, EARN IT Act, Metaverse Real Estate and Facebook loses users

Tanvir Talks

Play Episode Listen Later Feb 17, 2022 46:46 Transcription Available


Hey guys and welcome back to another episode of Tanvir Talks! Join me, your host Tanvir, and my trusted co-host, Ehsan, in the latest Tanvir Talks episode where we discuss: Housekeeping We have a podcast website, check it out! The transcript for all our episodes are posted there. I have a blog - read it here . Check out our YouTube channel. New Samsung Phones and Tablets Samsung have announced their latest range of tablets and phones. Ehsan and I discuss the future of Android tablets, and I warn European buyers of Samsung's new chip. EARN IT Act EARN IT Act targets big tech and their apparent lack of action on reporting Child Sexual Abuse Material (CSAM). We discuss what is wrong with this bill, and how it may affect the how we use social media. Metaverse Real Estate Ehsan talks about a video he watched about companies buying up Metaverse Real Estate. We discuss if that's worth it, and what even is the Metaverse? (Check out my blog post on it)  Faceboook loses users for the first time ever Facebook lost 0.01Billion users for the first time ever. With fewer people using Facebook, is this the end? What's next for Meta?  Thank you for listening! Read my latest blog post. Subscribe to this podcast on Apple, Google, Spotify, or wherever you get your podcasts.

Humanize
Rebecca Friedrichs on exposing the sexualizing of children in schools and ‘For Kids and Country’

Humanize

Play Episode Listen Later Dec 6, 2021 51:09


In a previous program with Donna Rice Hughes, Wesley discussed how children are victimized by commercial sources of pornography and obscene Internet content. It was an important conversation, and if you missed it, you can listen to it here: Donna Rice Hughes of ‘Enough Is Enough' on Porn, Child Sexual Abuse Material (CSAM), and Healing Our Culture | Humanize Unfortunately, Read More ›

WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives
Notes from the Electronic Cottage 8/26/21: Apple Scanning Photos on User Devices

WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives

Play Episode Listen Later Aug 26, 2021 8:20


Producer/Host: Jim Campbell Apple has announced that it’s next software update for iPhones and iPads will contain software that will scan photos on a user’s device before thye are uploaded to a user’s iCloud account for any images that contain Child Sexual Abuse Material (CSAM). CSAM is a problem on today’s web and Apple’s new initiative sounds like a useful approach, and one that is more private than scanning all of a user’s photos stored in the cloud. Some are applauding Apple but over 7000 security experts and over 100 civic, human rights, and privacy organizations definitely are not. Here’s why. About the host: Jim Campbell has a longstanding interest in the intersection of digital technology, law, and public policy and how they affect our daily lives in our increasingly digital world. He has banged around non-commercial radio for decades and, in the little known facts department (that should probably stay that way), he was one of the readers voicing Richard Nixon's words when NPR broadcast the entire transcript of the Watergate tapes. Like several other current WERU volunteers, he was at the station's sign-on party on May 1, 1988 and has been a volunteer ever since doing an early stint as a Morning Maine host, and later producing WERU program series including Northern Lights, Conversations on Science and Society, Sound Portrait of the Artist, Selections from the Camden Conference, others that will probably come to him after this is is posted, and, of course, Notes from the Electronic Cottage. The post Notes from the Electronic Cottage 8/26/21: Apple Scanning Photos on User Devices first appeared on WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives.

Notes From The Electronic Cottage | WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives
Notes from the Electronic Cottage 8/26/21: Apple Scanning Photos on User Devices

Notes From The Electronic Cottage | WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives

Play Episode Listen Later Aug 26, 2021 8:20


Producer/Host: Jim Campbell Apple has announced that it’s next software update for iPhones and iPads will contain software that will scan photos on a user’s device before thye are uploaded to a user’s iCloud account for any images that contain Child Sexual Abuse Material (CSAM). CSAM is a problem on today’s web and Apple’s new initiative sounds like a useful approach, and one that is more private than scanning all of a user’s photos stored in the cloud. Some are applauding Apple but over 7000 security experts and over 100 civic, human rights, and privacy organizations definitely are not. Here’s why. About the host: Jim Campbell has a longstanding interest in the intersection of digital technology, law, and public policy and how they affect our daily lives in our increasingly digital world. He has banged around non-commercial radio for decades and, in the little known facts department (that should probably stay that way), he was one of the readers voicing Richard Nixon's words when NPR broadcast the entire transcript of the Watergate tapes. Like several other current WERU volunteers, he was at the station's sign-on party on May 1, 1988 and has been a volunteer ever since doing an early stint as a Morning Maine host, and later producing WERU program series including Northern Lights, Conversations on Science and Society, Sound Portrait of the Artist, Selections from the Camden Conference, others that will probably come to him after this is is posted, and, of course, Notes from the Electronic Cottage. The post Notes from the Electronic Cottage 8/26/21: Apple Scanning Photos on User Devices first appeared on WERU 89.9 FM Blue Hill, Maine Local News and Public Affairs Archives.

TWiT Bits (MP3)
MBW Clip: An Update on Apple's CSAM Scanning Plans

TWiT Bits (MP3)

Play Episode Listen Later Aug 17, 2021 18:51


On MacBreak Weekly, Leo Laporte, Rene Ritchie, Andy Ihnatko, and Alex Lindsay discuss the latest round of updates regarding Apple's upcoming plans for Child Sexual Abuse Material (CSAM) scanning on its devices. Full episode at twit.tv/mbw779 Hosts: Leo Laporte, Andy Ihnatko, Rene Ritchie, and Alex Lindsay You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

apple scanning twit leo laporte rene ritchie andy ihnatko alex lindsay apple csam apple's csam child sexual abuse material csam safari redesign apple sideloading apple icloud scanning apple image scanning apple child sexual abuse material apple photos scanning on macbreak weekly apple photo library scanning
TWiT Bits (Video HD)
MBW Clip: An Update on Apple's CSAM Scanning Plans

TWiT Bits (Video HD)

Play Episode Listen Later Aug 17, 2021 18:56


On MacBreak Weekly, Leo Laporte, Rene Ritchie, Andy Ihnatko, and Alex Lindsay discuss the latest round of updates regarding Apple's upcoming plans for Child Sexual Abuse Material (CSAM) scanning on its devices. Full episode at twit.tv/mbw779 Hosts: Leo Laporte, Andy Ihnatko, Rene Ritchie, and Alex Lindsay You can find more about TWiT and subscribe to our podcasts at https://podcasts.twit.tv/

apple scanning twit leo laporte rene ritchie andy ihnatko alex lindsay apple csam apple's csam child sexual abuse material csam safari redesign apple sideloading apple icloud scanning apple image scanning apple child sexual abuse material apple photos scanning on macbreak weekly apple photo library scanning
Yannic Kilcher Videos (Audio Only)
How Apple scans your phone (and how to evade it) - NeuralHash CSAM Detection Algorithm Explained

Yannic Kilcher Videos (Audio Only)

Play Episode Listen Later Aug 16, 2021 50:37


#apple #icloud #privacy Apple recently announced scanning all images uploaded to iCloud for CSAM (child abuse material), and that this scan would happen locally on users' phones. We take a look at the technical report and explore how the system works in detail, how it is designed to preserve user privacy, and what weak points it still has. OUTLINE: 0:00 - Introduction 3:05 - System Requirements 9:15 - System Overview 14:00 - NeuralHash 20:45 - Private Set Intersection 31:15 - Threshold Secret Sharing 35:25 - Synthetic Match Vouchers 38:20 - Problem 1: Who controls the database? 42:40 - Problem 2: Adversarial Attacks 49:40 - Comments & Conclusion Paper: https://www.apple.com/child-safety/pd... ML News Episode about CSAM: https://youtu.be/gFkBqD2hbnU Abstract: CSAM Detection enables Apple to accurately identify and report iCloud users who store known Child Sexual Abuse Material (CSAM) in their iCloud Photos accounts. Apple servers flag accounts exceeding a threshold number of images that match a known database of CSAM image hashes so that Apple can provide relevant information to the National Center for Missing and Exploited Children (NCMEC). This process is secure, and is expressly designed to preserve user privacy. CSAM Detection provides these privacy and security assurances: • Apple does not learn anything about images that do not match the known CSAM database. • Apple can't access metadata or visual derivatives for matched CSAM images until a threshold of matches is exceeded for an iCloud Photos account. • The risk of the system incorrectly flagging an account is extremely low. In addition, Apple manually reviews all reports made to NCMEC to ensure reporting accuracy. • Users can't access or view the database of known CSAM images. • Users can't identify which images were flagged as CSAM by the system. For detailed information about the cryptographic protocol and security proofs that the CSAM Detection process uses, see The Apple PSI System. Links: TabNine Code Completion (Referral): http://bit.ly/tabnine-yannick YouTube: https://www.youtube.com/c/yannickilcher Twitter: https://twitter.com/ykilcher Discord: https://discord.gg/4H8xxDF BitChute: https://www.bitchute.com/channel/yann... Minds: https://www.minds.com/ykilcher Parler: https://parler.com/profile/YannicKilcher LinkedIn: https://www.linkedin.com/in/yannic-ki... BiliBili: https://space.bilibili.com/1824646584 If you want to support me, the best thing to do is to share out the content :) If you want to support me financially (completely optional and voluntary, but a lot of people have asked for this): SubscribeStar: https://www.subscribestar.com/yannick... Patreon: https://www.patreon.com/yannickilcher Bitcoin (BTC): bc1q49lsw3q325tr58ygf8sudx2dqfguclvngvy2cq Ethereum (ETH): 0x7ad3513E3B8f66799f507Aa7874b1B0eBC7F85e2 Litecoin (LTC): LQW2TRyKYetVC8WjFkhpPhtpbDM4Vw7r9m Monero (XMR): 4ACL8AGrEo5hAir8A9CeVrW8pEauWvnp1WnSDZxW7tziCDLhZAGsgzhRQABDnFy8yuM9fWJDviJPHKRjV4FWt19CJZN9D4n

Logbuch:Netzpolitik
LNP403 Leichte Schläge auf den Hinterkopf

Logbuch:Netzpolitik

Play Episode Listen Later Aug 16, 2021 94:22 Transcription Available


Neben Eurem Feedback nehmen wir uns heute viel Zeit die umstrittene "Child Safety" Initiative von Apple unter die Lupe zu nehmen. Wir stellen vor, mit welcher Technik Apple sich auf die Suche nach "Child Sexual Abuse Material (CSAM)" machen möchte und welche Implikationen das hat. Ist das System der Türöffner für Hintertüren oder verhindert das ausgeklügelte Kryptosystem deren Einführung. Auch wir sind da nicht unbedingt einer Meinung und diskutieren über Technik und Moral.

Speakeasy Security
Apple to begin reporting Child Sexual Abuse Material (CSAM)

Speakeasy Security

Play Episode Listen Later Aug 16, 2021 21:57


Apple recently announced it will begin reporting Child Sexual Abuse Material (CSAM) to law enforcement with the latest iOS 15 update. The new system aims to identify images using a process called hashing, which turns images into numbers. On this episode, we discuss how Apple's new system will work and how this bold step in combating Child Sexual Abuse is being received by privacy-sensitive users around the world.Links:Apple to combat Child Sexual Abuse Material:  https://www.cnbc.com/2021/08/05/apple-will-report-child-sexual-abuse-images-on-icloud-to-law.html  National Center for Missing Exploited Children (NCMEC): Home (missingkids.org)  Internet Watch Foundation (IWF): Homepage | Internet Watch Foundation (iwf.org.uk) 

All TWiT.tv Shows (Video LO)
Tech News Weekly 196: Not Sold on the Z Fold

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Aug 12, 2021 65:30


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

apple vice researchers sold samsung ritchie unpacked coindesk mikah samsung unpacked z fold jason howell rene ritchie mikah sargent club twit child sexual abuse material macbreak weekly apple csam tech news weekly tech news today child sexual abuse material csam apple icloud scanning apple image scanning apple child sexual abuse material apple photos scanning mikah sargent guests rene ritchie
All TWiT.tv Shows (Video HI)
Tech News Weekly 196: Not Sold on the Z Fold

All TWiT.tv Shows (Video HI)

Play Episode Listen Later Aug 12, 2021 65:30


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

apple vice researchers sold samsung ritchie unpacked coindesk mikah samsung unpacked z fold jason howell rene ritchie mikah sargent club twit child sexual abuse material macbreak weekly apple csam tech news weekly tech news today child sexual abuse material csam apple icloud scanning apple image scanning apple child sexual abuse material apple photos scanning mikah sargent guests rene ritchie
All TWiT.tv Shows (Video HD)
Tech News Weekly 196: Not Sold on the Z Fold

All TWiT.tv Shows (Video HD)

Play Episode Listen Later Aug 12, 2021 65:30


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

apple vice researchers sold samsung ritchie unpacked coindesk mikah samsung unpacked z fold jason howell rene ritchie mikah sargent club twit child sexual abuse material macbreak weekly apple csam tech news weekly tech news today child sexual abuse material csam apple icloud scanning apple image scanning apple child sexual abuse material apple photos scanning mikah sargent guests rene ritchie
Tech News Weekly (Video HD)
TNW 196: Not Sold on the Z Fold - Apple CSAM, Crypto Tax, Bypassing Facial Recognition, Samsung Unpacked

Tech News Weekly (Video HD)

Play Episode Listen Later Aug 12, 2021 65:30


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

All TWiT.tv Shows (MP3)
Tech News Weekly 196: Not Sold on the Z Fold

All TWiT.tv Shows (MP3)

Play Episode Listen Later Aug 12, 2021 65:12


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

apple vice researchers sold samsung ritchie unpacked coindesk mikah samsung unpacked z fold jason howell rene ritchie mikah sargent club twit child sexual abuse material macbreak weekly apple csam tech news weekly tech news today child sexual abuse material csam apple icloud scanning apple image scanning apple child sexual abuse material apple photos scanning mikah sargent guests rene ritchie
Tech News Weekly (Video LO)
TNW 196: Not Sold on the Z Fold - Apple CSAM, Crypto Tax, Bypassing Facial Recognition, Samsung Unpacked

Tech News Weekly (Video LO)

Play Episode Listen Later Aug 12, 2021 65:30


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

Tech News Weekly (Video HI)
TNW 196: Not Sold on the Z Fold - Apple CSAM, Crypto Tax, Bypassing Facial Recognition, Samsung Unpacked

Tech News Weekly (Video HI)

Play Episode Listen Later Aug 12, 2021 65:30


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

Tech News Weekly (MP3)
TNW 196: Not Sold on the Z Fold - Apple CSAM, Crypto Tax, Bypassing Facial Recognition, Samsung Unpacked

Tech News Weekly (MP3)

Play Episode Listen Later Aug 12, 2021 65:11


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

Total Mikah (Video)
Tech News Weekly 196: Not Sold on the Z Fold

Total Mikah (Video)

Play Episode Listen Later Aug 12, 2021 65:30


After Apple detailed its plans for protecting against Child Sexual Abuse Material (CSAM), many questioned the impact such a decision could have. The U.S. is set to pass a new infrastructure bill that features a cryptocurrency tax provision. Researchers have created what they call a set of "master faces" to bypass facial recognition. Samsung announced a slew of foldable phones at its Unpacked event. First, Rene Ritchie joins Tech News Weekly to provide an update on Apple's recently announced plans for finding Child Sexual Abuse Material on its platform. Ritchie explains the technology, details some of the criticisms, and discusses the pros and cons of end-to-end encryption. Then, Nikhilesh De of CoinDesk stops by to discuss a provision in the U.S.'s new infrastructure bill. The bill, which is set to pass, features a provision regarding a cryptocurrency tax, but some argue the language surrounding the tax is broad and lacks clarity. Then, Mikah shares a story from Vice about a study in which researchers created a series of "master faces" that could be used to bypass facial recognition technology. Lastly, Jason and Mikah discuss the Samsung Unpacked event. Jason shares his thoughts on the latest announcements and the two ponder the utility of foldable phones and devices. Hosts: Jason Howell and Mikah Sargent Guests: Rene Ritchie and Nikhilesh De Download or subscribe to this show at https://twit.tv/shows/tech-news-weekly. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: itpro.tv/tnw promo code TNW30 akamai.com/tnw

apple vice researchers sold samsung ritchie unpacked coindesk mikah samsung unpacked z fold jason howell rene ritchie mikah sargent club twit child sexual abuse material macbreak weekly apple csam tech news weekly tech news today child sexual abuse material csam apple icloud scanning apple image scanning apple child sexual abuse material apple photos scanning mikah sargent guests rene ritchie
Techstream with Shelly Palmer and Seth Everett
Apple Plans to Scan Your iPhone. Should You Worry?

Techstream with Shelly Palmer and Seth Everett

Play Episode Listen Later Aug 10, 2021 38:20


Apple will soon start scanning your iPhone for child pornography and other illegal content. Should you be worried? We discuss the Child Sexual Abuse Material (CSAM) database, what Apple is looking for with its scans, and (perhaps more importantly) what it is *not* looking for. We discuss the two sides to this argument and issue, what (exactly) Apple's commitment to protecting you really means, and whether or not Apple is likely to make a mistake, along with the lessons Apple could (or should) learn from BlackBerry.

apple iphone worry blackberry scan child sexual abuse material csam
Hawaii Chinese Radio 檀島廣播網
2021.0808 一週要聞

Hawaii Chinese Radio 檀島廣播網

Play Episode Listen Later Aug 9, 2021 13:18


》隨著國家驅逐禁令到期,歐胡島還沒有花完數千萬的租金援助。 》明年夏威夷州長選舉,目前候選人的募款情形:現任副州長喬什.格林在今年前六個月在夏威夷州長競選中籌集了超過400,000美元,而另一候選人,前檀香山市長柯克.考德威爾僅籌集了9,000美元。 》有限度的禁槍新法律會導致夏威夷當地人為自衛而武裝自己嗎?有人說不會致命的電擊槍(Taser)也許是個好選擇。 》一項研究表明,失業保險金並沒有阻止人們重新加入勞動力隊伍,但經濟學家不知道為什麼酒店工作沒有完全恢復? 》歷史學家余英時逝世於普林斯頓,享年91歲 》美國証券交易所納斯達克(NASDAQ)表示,對於在該所上市的公司,將制定具有約束力的性別及多元化目標。 》蘋果公司宣布在美國的手機用戶上排查兒童性虐材料(Child Sexual Abuse Material ,簡稱CSAM)新系統的細節。在圖片被儲存在雲端圖片庫之前,這項技術將能搜尋與已知的CSAM圖片匹配。 》蘋果公司(Apple)在其年度軟件發布大會上宣布了一系列全新的隱私保護功能。 》中國問題專家章家敦表示,中共領導人習近平在疫情的傳染性方面撒謊,在武漢疫情爆發後封鎖自己國家的同時,向其它國家施壓,要求它們不要對來自中國的入境者實施旅行限制和隔離。 “你把這兩件事放在一起,其實還有更多,但你只把這兩件事放在一起,會表明這是一起故意傳播疾病的事件。”章家敦說。 他還說,中共領導人知道已經將COVID-19(中共病毒引發的肺炎疾病)傳播到世界其它地方,殺死了數百萬人但沒有受到任何懲罰,接下來它們可以不受懲罰地傳播下一種疾病。 章家敦還表示,中共真的希望看到美國政府被推翻。 》COVID-19的起源越來越引發美國議員的關注。8月2日,美國眾議院外交事務委員會首席共和黨議員邁克爾·麥考爾(Michael McCaul)所領導的眾議院中國工作組公布COVID-19溯源報告更新版。報告指出,大量証據表明,病毒是由武漢病毒研究所泄漏。 》阿里巴巴公司女職員向公司投訴其上司和客戶在工作飯局中將其灌醉,對她性侵猥褻。由於未能得到公司高層的支持,她隨將該案曝光鬧大,山東濟南市公安局槐蔭區分局於8月8日在網上貼出告示,稱對“阿里女員工被侵害”的警情,目前正在積極調查取證。 》一項新發布的研究顯示,一個由350個社交媒體賬號組成的矩陣大力傳播親北京的聲音,但很多賬號的頭像由AI合成,並幾乎在同一時間發布相同的文字和圖片。 》8月5日,美國白宮宣布為在美國的香港居民提供“臨時避風港”(Temporary safe haven),允許他們延長在美國逗留時間,給予為期18個月的“延期離境”。 《華爾街日報》日前引述消息人士的話報導稱,中國政府正計畫在港澳出台新的法律,可能會禁止在這兩個城市的外國實體和個人遵守針對中國的制裁措施。 》英國海軍 “伊麗莎白女王” 號 (HMS Queen Elizabeth)航母打擊群被中共潛艦秘密跟蹤 --- Send in a voice message: https://anchor.fm/aloha808/message

Radio Raccoons
S03E03 - Bart Preneel - Een kijkje in de wereld van cryptografie

Radio Raccoons

Play Episode Listen Later Jul 12, 2021 59:20


Bart Preneel, professor en cryptograaf aan de KU Leuven duikt samen met Deevid in de wonderlijke en schimmige wereld van de cryptografie. Met topics van privacy-vriendelijk elektronisch stemmen tot massale overheidssurveillantie lichten ze een tipje van de sluier. Daarnaast bespreken ze of quantum computing wel eens het begin of het einde zou kunnen zijn van encryptie zoals we het kennen.CryptografieCryptografie is geheimschrift. Zodra mensen konden schrijven, begonnen ze ook zaken op te schrijven op een manier die voor anderen niet leesbaar was. Geheimschrift is eigenlijk even oud als het schrift zelf, maar cryptografie was tot 100 jaar geleden alleen maar toegankelijk voor machtigen, zoals koningen, diplomaten en generaals. Cryptografie werd dus gebruikt om machtigen af te schermen van gewone gebruikers.100 jaar geleden begon draadloze communicatie. Toen werd cryptografie ook belangrijk voor zakenmensen, die digitale transacties uitvoerden. Ook in een militaire context werden berichten naar schepen geëncrypteerd. Daardoor is er een soort 'cryptoboom' gekomen, met codeertoestellen zoals de Enigma.Fast forward naar nu. Waar cryptografie alleen in de handen van overheid en banken lag, ligt het nu in de handen van iedereen. We gebruiken allemaal cryptografie om onszelf te beschermen: in onze mobiele telefoon, onze identiteitskaart, op het internet, in onze autosleutels... Er zijn 30 à 40 miljard cryptotoestellen op de wereld vandaag.Cryptografie heeft een vlucht genomen sinds de introductie van de computer. In de moderne computerwereld heeft cryptografie de context van versleutelen zodat niemand het kan lezen, maar het gaat nu ook verder. Het gaat verder dan geheimhouding: authenticatie van mensen en zelfs software. Bijvoorbeeld bij het updaten van een app, wordt het principe gebruikt om te bewijzen dat de software geen malware bevat.Een korte samenvatting: alle interacties die je hebt in de fysieke wereld, hoe complex ze ook mogen zijn (zoals betalingen, onderhandelingen, verkiezingen), gaan we vertalen naar de digitale wereld. Historisch gezien ging het om de bescherming communicatie, dan de bescherming van opslag, en nu de verwerking van data in een vercijferde vorm.VerkiezingenEr bestaat een cliché dat IT-mensen huiveren van het idee van digitale verkiezingen tegenover verkiezingen met pen en papier omdat het onmogelijk is om dat te beveiligen. Professor Preneel gaat akkoord. Cryptografen zijn zeer wantrouwig tegenover digitale verkiezingen. Ze vertrouwen de cryptografie wel, maar niet de computers waarop gestemd wordt.Computers zijn heel complex: de chips hebben miljarden transistoren, het beheersysteem heeft miljoenen lijnen codes en alle applicaties hebben verschillende megabytes. Het gaat om een enorme complexiteit, waar altijd kleine foutjes in sluipen. Zo'n foutjes kunnen een verkiezing volledig ondermijnen. Er wordt wel onderzoek naar gedaan. In België is er bijvoorbeeld een systeem waar de computer je helpt, maar je stem wordt wel afgedrukt op papier. Het is een versneld telsysteem, een handige manier om je stem uit te brengen. De combinatie tussen computer en papier is erg handig, en je hoeft de computer niet te vertrouwen want je kan zien wat afgedrukt wordt.Er zijn wel systemen, zoals Helios, om op afstand te stemmen. Dat is een systeem waar je online kan inloggen en stemmen. Je stem wordt dan vercijferd en in die vorm opgeteld, zodat alleen jij weet op wie je gestemd hebt. Alleen je computer kan je bedriegen in dat geval.Bij de rectorverkiezingen van de KU Leuven was professor Preneel's suggestie om op papier te stemmen, maar uiteindelijk hebben ze toch elektronisch gestemd omwille van de pandemie. Ze hebben gewerkt met een systeem dat Code Vote heet. Mensen krijgen met de post codes toegestuurd met een kraslaagje. Zelf al wordt je brief onderschept, je kan ze niet ongezien open doen. Als je kraslaag er nog is, is je code beschermd. Je geeft je code dan online in, en zo kunnen de stemmen geteld worden. Op die manier heb je veel manieren om na te gaan of alles correct verloopt. Het grote voordeel van dit systeem is dat de computer niet weet op wie je stemt, want de computer (of de hacker) weet niet met wie de code overeenstemt. Dat systeem heeft goed gewerkt, maar het is nog niet klaar voor prime time nationale verkiezingen. Als je een aantal partijen zou kunnen omkopen, dan kan het toch fout lopen. Voor zeer gevoelige verkiezingen kan dit dus nog niet.Een ander probleem bij elektronische verkiezingen is dat je je stem kan verkopen of dat mensen je kunnen dwingen om te stemmen op een bepaalde persoon. Dat is een probleem waar ze nog geen oplossing voor gevonden hebben.Menselijke factorAls je met cryptografie bezig bent, moet je rekening houden met de menselijke factor. Je kan mensen nooit uitsluiten als bron van problemen. "Als je informatie beschermt, zal het altijd terecht komen bij een persoon die het leest. Je hebt nog steeds te kampen met een menselijke beslissing. De mens blijft de zwakste schakel van heel het systeem," volgens professor Preneel. Mensen zijn goedgelovig, maar ook economisch gezien zie je dat mensen aan kortetermijndenken doen en niet strategisch nadenken. Toch gelooft Preneel dat er een grote verantwoordelijkheid bij de ingenieurs ligt.Om dat te illustreren, maakt professor Preneel een analogie. "Stel dat er een gebouw is waar je een bepaalde deur niet mag openen, dan gaat toch altijd iemand de deur openen. Bij een computersysteem geldt dat ook. Mensen zijn nieuwsgierig, gehaast, slordig, of verstrooid. Die deur kan heel het gebouw laten invallen. Ingenieurs moeten leren gebouwen bouwen waar geen deur het gebouw kan laten instorten."De gebruikers zijn voor een stuk verantwoordelijk, maar aan de andere kant ligt er ook verantwoordelijkheid bij diegene die systemen bedenken en ontwerpen. Het is gemakkelijk om te zeggen dat gebruikers moeten opletten, maar eigenlijk moeten er gewoon robuuste systemen gebouwd worden. Criminelen studeren vaak psychologie en weten hoe ze mensen moeten manipuleren. Kijk maar naar scam calls waardoor mensen geld overschrijven omdat hun rekeningen zogezegd bedreigd worden. Daar kan cryptografie weinig bescherming bieden, maar artificiële intelligentie misschien wel. AI zou kunnen detecteren dat het wel vreemd is dat iemand plots 10.000 euro naar een willekeurige rekening overschrijft. "Het is belangrijk dat we gedrag en psychologie in rekening brengen wanneer we oplossingen bouwen," concludeert Preneel.Artificiële intelligentieHeel veel beveiliging is nog ad hoc, en daar kan AI zeker een rol spelen. Met machine learning systemen kan je bijvoorbeeld ontdekken hoe je een systeem kan aanvallen. Zeker in de VS zal men voor een stuk opgeven om systemen te beveiligen. In Europa vertrouwen mensen op hun bankkaarten door pincodes, maar in de VS betalen veel mensen nog steeds met cheques die ze inscannen en met een smartphone doorsturen zonder enige beveiliging.Zo zie je dat er een verschil is in filosofie: "Wij willen een systeem veilig houden, in de VS houden ze iedereen grondig in het oog. Als ze iets fout doen, dan straffen ze zeer streng. Die aanpak vertaalt zich meer en meer naar Europa. Ofwel investeer je in beveiliging, maar dat is duur en dat zal nooit perfect zijn, ofwel houd je alles in het oog via netwerkverkeer met artificiële intelligentie die kan herkennen wat goed of slecht gedrag is," volgens Preneel.In het algemeen werkt die aanpak wel, maar er zijn twee problemen: Privacy. Systemen houden alles in het oog en iedereen wordt voortdurend gemonitord. Slimme criminelen. Zij weten hoe ze zich moeten gedragen op een manier die moeilijk te leren is. Zij gedragen zich op een manier die sterk afwijkt van ander slecht gedrag. Daarnaast zetten zij ook artificiële intelligentie in om die AI-systemen aan te vallen. "Je krijgt dan een soort oorlog van de AI-systemen waar zowel verdedigers als aanvallers AI inzetten. Een ding weten we wel zeker: privacy zijn we dan kwijt." PrivacyDoor de verstrengeling van privacy en cryptografie botst cryptografie vaak ook met de wereld van de overheid. "Cryptografie gaat over macht. Als je met cryptografie bezig bent en nadenkt over toepassingen, kom je altijd in discussies terecht over controle."De overheid heeft altijd toegang gehad tot communicatie in zekere zin, bijvoorbeeld telefoongesprekken onderscheppen of brieven openen. Vandaag, met technologieën zoals WhatsApp, krijg je end-to-end encryptie. Op je telefoon is er geen encryptie. Zodra iets over het vast netwerk gaat, is het niet vercijferd. "Ook voor 5G is er zo'n discussie. Daar wordt in principe niets end-to-end vercijferd. Dat is zorgwekkend, want 5G wordt ook gebruikt voor robots en zelfrijdende voertuigen. Ook daar heb je het risico van interceptie."Privacy is een grondrecht van de burger. Op zich is er geen probleem dat de overheid in selectieve gevallen toegang wilt volgens Preneel. Op dit moment gebeurt dat door telefoons te hacken. De vraag is hoeveel telefoons worden gehackt, of er ook informatie kan worden geplant (en of mensen dus vals beschuldigd worden). Er zijn veel consequenties waarvan je niet weet wat de implicaties zijn. Vroeger kon de overheid niet binnenkijken in alle communicatie. Dat kon maar op een beperkte schaal, zo moesten bijvoorbeeld alle afgetapte telefoongesprekken uitgeschreven worden door de politie. Digitaal kan je alles onderscheppen en lezen, en dat is niet goed voor de maatschappij want er is een zeer groot risico op misbruik. "We moeten massale interceptie tegen houden, en end-to-end encryptie is daar een goede oplossing voor."Toch heeft interceptie soms ook voordelen. Zo werden veel pedofilienetwerken opgerold doordat Facebook Messenger niet end-to-end vercijferd werd. Dat is ondertussen wel het geval, dus zo'n netwerken worden nu op een andere manier opgespoord. Ze kunnen berichten niet meer onderscheppen, maar ze kunnen wel aan de bron filteren tegen bekende Child Sexual Abuse Material (CSAM). "Op het eerste zicht lijkt dat een redelijke oplossing, want je blijft end-to-end encryptie behouden. Je filtert tegen schandalig materiaal, maar als die kringen weten welke beelden worden onderschept, dan gaan ze andere beelden sturen. Dan komt het risico dat de overheid andere middelen gaat inzetten. "In West-Europa zijn we nog niet zo bezorgd, maar denk maar aan Hongarije of Polen. Zoiets kan leiden tot een systeem van censuur door de overheid op een manier die niet zichtbaar of transparant is."Who watches the watchers?NSO Group en Hacking Team hebben toegang tot machines op afstand. Zij betalen een miljoen dollar voor zero days en gebruiken die om op afstand in te breken. De overheid gebruikt dat. Hoe weten we dat? Hacking team is gehackt en al hun tools met klantenlijst staan op Wikipedia.Zo'n systemen bestaan, dat is een economische en politieke realiteit. "We moeten als maatschappij de controle op deze systemen opvoeren, want het geeft heel veel macht aan overheden. Die macht is er en je kan ze niet terugschroeven. Vanuit experten moet je voldoende controle uitoefenen."Er is ook een tweede aspect: metadata. De overheid weet wie met wie communiceert, iedereen heeft mobiele telefoon, iedereen weet waar je bent (Google weet het ook). Ook al zet je je wifi even uit, als je het terug opzet, dan word je telefoon uiteindelijk toch gelokaliseerd door Google, Apple en telecommaatschappijen. Kortom: ze weten waar je bent en met wie je praat.Metadata is een zeer machtige tool om mensen te controleren. In Europa hebben we de dataretentierichtlijn die operatoren verplicht om data bij te houden. In België is dat voor 1 jaar. Die richtlijn is al vaak aangevochten bij het Hof van Justitie, en vreemd genoeg geeft het Hof ook toe dat het niet wettig is en in strijd is met het recht op privacy. Die metadata is echter zo belangrijk dat de meeste landen het toch omzeilen door de wetgeving een klein beetje aan te passen. Dan begint er opnieuw een rechtszaak van 5 jaar, en begint het spelletje opnieuw.De overheid kan al heel veel doen op dit moment. Er zijn overal camera's om misdaad op te sporen, gestolen of niet-verzekerde auto's op te sporen of om te kijken of de coronamaatregelen worden nageleefd. "Als maatschappij moeten we ons afvragen tot in hoeverre we toegang tot zo'n tools moeten controleren. Er is veel nood naar onderzoek rond bescherming van metadata.""Als Europeanen moeten we niet zo gerust zijn. De Amerikanen bespioneren ons uitgebreid met behulp van hun Britse vrienden, en dat gaat na de Brexit zeker niet verminderen. Aan de andere kant bespioneren wij op onze beurt ook de Amerikanen," vertelt Preneel. "Wat niet goed geweten is, is dat er veel nauwe samenwerkingen zijn. Zo heb je de Five Eyes: de VS, Canada, Australië, Nieuw-Zeeland en het VK. Daarnaast heb je ook veel andere samenwerkingsverbanden. De NSA en GCHQ hebben systemen waar zij alle bronnen kunnen samenvoegen en analyses uitvoeren."Om een idee te geven hoe machtig die systemen zijn: de Bundesnachrichtendienst (de Duitse geheime dienst) bespioneerde Franse en Duitse bedrijven, en geeft die informatie aan de Britten in ruil voor toegang tot hun analysesystemen. Die systemen zijn dus zo waardevol dat zij bereid waren om informatie te geven over hun eigen burgers en bedrijven aan concurrenten om zo mensen in het oog te houden.Over België zijn er geen samenwerkingsverbanden, maar het is wel erg duidelijk voor professor Preneel dat alle metadata die we hebben naar de Britten en Amerikanen gaat. Dat doen we zodat we hun systemen kunnen inkijken als er een aanval is in Brussel, bijvoorbeeld. "Daar wordt nooit politiek over gediscussieerd, dat zijn dingen die volledig verborgen gehouden worden voor de burger. Als je alle documenten grondig leest en alle puntjes verbindt, dan zie je een plaatje dat wel zorgwekkend is."Wat als ik een misdaad bega?Tegenwoordig is het moeilijk om bewaking te ontlopen. Je kan je telefoon thuislaten of hem in een soort van kooi van Faraday steken, maar alle mensen rondom jou hebben ook een telefoon. Als ze weten wie jouw contacten zijn, kunnen ze daar ook kijken of je in de buurt bent door stemdetectie. Ook via camera's kunnen ze mensen opsporen. Ze hebben van alles beelden. Ook wagens worden gevolgd.Een moderne wagen heeft een tachtigtal processoren en er zitten ook een 3 à 4 "gsm's" in met simkaarten. Dat kwam een beetje in het nieuws toen Salah Abdeslam werd gearresteerd. Hij had blijkbaar een voorkeur voor Duitse wagens en ging daarmee medeterroristen oppikken in Europa. Zelfs achteraf, na de feiten, konden ze die activiteit nog zien en het spoor door Europa volgen. In principe moet je een auto van 1990 hebben om niet gevolgd te worden. Het probleem is dat er overal camera's staan, dus het is heel erg moeilijk.Daarnaast laat je ook veel sporen achter op toestellen. Zelfs als je informatie wist, blijft die erop staan. De enige manier om informatie van een flash drive te halen is het verbranden en in duizend stukjes te slaan. Met speciale tools blijven die gegevens zichtbaar, zelfs als je die gegevens overgeschreven hebt. "Als je niet gevonden wil worden, moet je eigenlijk 30 jaar terug in de tijd gaan en in een bos gaan wonen.""Cryptografie is de technologie die ons toelaat om naar geheimhouding te gaan, maar eigenlijk falen we compleet, want er is eigenlijk geen geheimhouding meer."Bart haalt ook het Sky Ecc verhaal aan. "Als ik misdadiger was, zou ik nooit zo'n standaardtelefoon nemen, want daar zit al van in het begin het probleem in dat er een achterdeurtje is."FlameFlame werkte door een hash collision attack. Zij hebben laten zien dat de NSA (of diegene dat het gedaan heeft) erg goed is in wiskunde. Die aanval was niet zo verrassend. Ze heeft de zwakheden van MD5 getoond aan de KU Leuven in 1992 al. Een Chinese professor (Wang Xiaoyun) heeft in 2004 aangetoond dat ze het best niet meer gebruikten.Na de publicatie van 2004 heeft Microsoft een MD5 removal person aangesteld. De taak van die persoon was om MD5 uit de producten van Microsoft te halen. Alleen al in Windows waren er maar liefst 800 toepassingen van MD5. Die removal person heeft gefaald, want er waren na 5 jaar nog steeds producten waar updates werden gedaan met MD5. Dat is niet alleen de fout van Microsoft, maar ook van hun klanten die legacy systemen hadden en die druk hebben uitgeoefend om toch nog MD5 te gebruiken. "Uit Flame kunnen we de les trekken dat het veranderlijk gedrag een zeer moeilijk probleem is en dat het 5 à 10 jaar kan duren als we er niet genoeg aandacht aan besteden."Quantum computersQuantum computers zijn 'gevaarlijk' voor cryptografen. "Het kan goed zijn dat wat we nu gebruiken binnen 10 jaar niet meer veilig is."Het breken van encryptie met quantum computers wordt gedaan met het Shor algoritme, priemfactorisatie en discrete logaritmen. Heel veel systemen hangen af van het feit dat factorisatie of discrete logaritmen moeilijk zijn. Het algoritme van Shor laat zien dat als je een grote computer kan bouwen, dat zo'n probleem plots gemakkelijk is. Er zijn nog geen grote quantum computers: de grootste zit momenteel op zo'n 50 fysische qubits. Het heeft nog een enorme afstand te gaan, we hebben een paar duizend logische qubits nodig. Dat vraagt een paar miljoen fysische qubits. Er wordt vooruitgang geboekt, maar toch trager dan je zou denken. Professor Preneel denkt desalniettemin dat de kans groot is dat het wel zal lukken, of dat nu binnen 10, 15 of 40 jaar is. Zo'n computers zijn jammer genoeg zeer duur. Ze worden gebruikt om crypto aan te vallen, en ook voor medisch onderzoek (om bepaalde moleculen te zoeken) of AI problemen op te lossen (optimalisatieproblemen). Als cryptografen zijn ze al lang bezig met dit probleem. Ze zijn al bijna 20 jaar op zoek naar andere algoritmen die bestand moeten zijn tegen quantum computers (post-quantum cryptografie). De Amerikaanse overheid heeft daarvoor een competitie opgestart. Er zijn al groot aantal algoritmen gebroken, en er blijven nog een tiental over (Seidel's algoritme onder andere). "We hebben nog wel een aantal troefkaarten achter de hand. Voor privacy zou het zeer slecht zijn als we geen antwoord vinden."Quantum encryptie: het einde van encryptie?Als cryptografen zijn ze zeer kritisch over quantum encryptie. "Als je kijkt waar de technologie nu staat, is QKD enorme overkill die eigenlijk nergens voor dient." Volgens Preneel hebben ze enorm goede marketing en grote budgetten. Het is een cool onderzoek, want ze manipuleren protonen, maar wat ze eigenlijk oplossen is key amplification (sleuteluitbreiding; een sleutel langer maken), maar dat kan je ook met AES."Hun oplossingen zijn punt tot punt, terwijl internet een netwerk is waar iedereen kan connecteren. De afstand is nog altijd beperkt, over glasvezel. Quantum repeaters bouwen is bijna even moeilijk als quantum computers bouwen. Het is ook geen oplossing voor authenticatie, wat een groter probleem is voor geheimhouding."P = NP?Volgens Preneel is dit mogelijks onbewijsbaar of toch niet met huidige technieken. "We moeten wachten op een doorbraak," sluit hij af.https://youtu.be/PywZbrLw8kg