• 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Apple searches iPhones
#1


So.  Apple announced they are searching iPhone images for "underage" content.




And searching encrypted messages for "sexually explicit" content.  (That one would seem to cover a lot of possibilities.)




And lock accounts and turn over to authorities.




So yet one more way we get burned by the damn pedos.




 




This would seem to be one more reason for the long-standing warning: 




Don't use your stupid damn cellphone for anything you want to keep private!




 




 


  Reply
#2

Quote:
21 hours ago, heavyhorse said:




Don't use your stupid damn cellphone for anything you want to keep private!




Exactly.




Soon this practice will probably be common in the EU for e-mail and various chat apps because of the EU Chat control that got passed.


  Reply
#3

Quote:
On 8/7/2021 at 8:00 AM, heavyhorse said:




So.  Apple announced they are searching iPhone images for "underage" content.




And searching encrypted messages for "sexually explicit" content.  (That one would seem to cover a lot of possibilities.)




And lock accounts and turn over to authorities.




So yet one more way we get burned by the damn pedos.




 




This would seem to be one more reason for the long-standing warning: 




Don't use your stupid damn cellphone for anything you want to keep private!




 




 




This is nothing new, and has been done for Decades. Staying away from 'big namers' can help (avoid Apple, Amazin devices, facebook). 'Sexual content' has also been used for decades. This has nothing to do with 'the pedos', again, if you own a phone and number, ANY service really, you're already seeping data.




It's fine to use your phone, you just need to be smart about which applications you use. Let's not forget, if they can 'read encrypted messages', they're not encrypted. Signal, Telegram, are two of the best sources to use for secure communications.




 


  Reply
#4

Quote:
3 hours ago, WinterGreenWolf said:




Let's not forget, if they can 'read encrypted messages', they're not encrypted. Signal, Telegram, are two of the best sources to use for secure communications.




VPNs, SSL, chat apps, etc all use point to point encryption.   You can also encrypt files and drives, *BUT*, for you to use it, it must be clear while your device is open.   That means that if they have access to your device, you're fucked.




I suggest sticking with open source for all sensitive matters.   It's not a guarantee but it takes the co-operation of a lot of people to sneak up on anyone.


  Reply
#5

Quote:
5 hours ago, caikgoch said:




VPNs, SSL, chat apps, etc all use point to point encryption.   You can also encrypt files and drives, *BUT*, for you to use it, it must be clear while your device is open.   That means that if they have access to your device, you're fucked.




I suggest sticking with open source for all sensitive matters.   It's not a guarantee but it takes the co-operation of a lot of people to sneak up on anyone.




OSS is definitely a good option. Though, services like Telegram help a LOT, they are E2E. Hell, some even block the ability to take screencaps.


  Reply
#6

Quote:
2 hours ago, WinterGreenWolf said:




Hell, some even block the ability to take screencaps.




Sorry but that's just a happy fantasy.   I can take and edit screenshots at will with off the shelf software.


  Reply
#7

Quote:
4 hours ago, caikgoch said:




Sorry but that's just a happy fantasy.   I can take and edit screenshots at will with off the shelf software.




So can I. That's not really a very warranted reason to 'avoid X or Y'. A lot of the time, a faked screen can be easily spotted by anyone with some skill in image editing.




 


  Reply
#8

What about using less well known services vs major ones?

  Reply
#9

Quote:
9 hours ago, HeartBeatOfTheBeast said:




What about using less well known services vs major ones?




I kind of prefer that.  The popular ones are more likely to have known exploits.  "They" even have work-arounds for TOR, which is the "gold standard" for privacy.




Epic Browser has encryption and proxy VPN, hides what you say or do and makes it look like you're in your choice of major cities.




Protonmail encrypted email, based in Switzerland.  Basic mail is free and requires no personal info to sign up. 


  Reply
#10

Quote:
10 hours ago, HeartBeatOfTheBeast said:




What about using less well known services vs major ones?




In phones it's the OS that gets you.   They are primarily info harvesting devices and will function as such no matter who bills you.   You need to start by buying an unlocked device.   That way you can at least turn off the worst offenders but you will have to turn it off again every time it updates.   There are also open source Linux phone OSs but they require a lot of effort to use and give up some functions (like banking).


  Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)