![apple photo privacy apple photo privacy](https://i.gadgets360cdn.com/large/apple_bloomberg_full_1531197928265.jpg)
Though that might sound like magic, with modern cryptography it’s actually possible to work with data that you cannot see. Story continues Spotting evidence without looking at it Apple’s answer to checking for child abuse material that’s protected by end-to-end encryption is a new procedure in which the cloud service provider, meaning Apple, and your device perform the image matching together. In this case, the provider cannot decrypt your photos. A cloud provider that stores secret keys might abuse its access to your data or fall prey to a data breach.Ī better approach to online safety is end-to-end encryption, in which the secret key is stored only on your own computer, phone or tablet.
![apple photo privacy apple photo privacy](https://9to5mac.com/wp-content/uploads/sites/6/2019/06/Sign-in-with-Apple-1.png)
With the key, the provider can also match photos stored on the cloud against known child abuse images held by the National Center for Missing and Exploited Children.īut this convenience comes at a big cost. Many cloud providers, including Apple, keep a copy of the secret key so they can assist you in data recovery if you forget your password. Encryption is one of the best tools for protecting personal information as it traverses the internet.Ĭan a cloud service provider detect child abuse material if the photos are garbled using encryption? It depends on who holds the secret key. Digital files can be protected in a sort of virtual lockbox via encryption, which garbles a file so that it can be revealed, or decrypted, only by someone holding a secret key.