top | item 35495591

(no title)

HeavyFeather | 2 years ago

With that logic you really shouldn't use your computer.

discuss

order

fbdab103|2 years ago

We are rapidly approaching that point. Apple is/was/will going to enable on-device scanning for someone's definition of naughty. Not hard to imagine that naughty will soon includes images of Winnie the Pooh, union formation, abortion, minority group X, what have you. Automatic notification of the authorities to follow.

Edit: To be clear, I am obviously opposed to CSAM, but on-device scanning is a privacy violation. Nobody knows what hashes trigger a flag, and they could be updated at anytime without the user being aware.

wilg|2 years ago

The problem is the top-level poster was also suggesting banning apps based on their definition of naughty (and "related" features).

flangola7|2 years ago

Running arbitrary and proprietary code without being able to review it first was always a mistake but we crossed that bridge over twenty years ago.

Every OS and chip manufacturer is working towards "secure core" architectures now. Executed code will run inside OS and silicon-level sandboxes. Memory spaces will not only be randomized, but encrypted and authenticated through dedicated secure enclaves. Hardened IOMMU modules will negotiate bus communication. System code is partitioned off and verified through hardware root of trust.

Malware as we have known it will be extinct in a few years.

saagarjha|2 years ago

I wish you’re right but I don’t see how what you’ve mentioned stops most malware.