

Hashing algorithms can mistakenly identify two photos as matches even when they aren't the same.

One of the biggest concerns of using algorithms to match pictures with the database is false alarms. The idea that you only need to be worried about such invasions if you've done something wrong is flawed thinking, and fails to see the aforementioned slippery slope. Oppressive or not, government involvement in your daily and personal life can be unnerving, and is an invasion of your privacy. That means governments with a cult mentality can monitor users on a more personal level if they get their hands on it. The system it has created to detect pedophiliac content can be used to detect any sort of content on phones.

On the one hand, it's meant to combat child sexual abuse on the other, it can be used to further perpetuate other kinds of abuse. It doesn't only facilitate a major breach of privacy, but also paves the way for abusive, toxic, or controlling relatives, guardians, friends, lovers, care-takers, and exes to further invade someone's personal space or restrict their liberty. Related: What Is a Backdoor and What Does It Do? Now it's a matter of motivation and determination for people to access other people's personal information. Insider AbuseĪlthough designed for a benevolent cause, this feature can turn into a total disaster for certain people if their devices are registered into the system, with or without their knowledge, by relatives interested in monitoring their communication.Įven if that doesn't happen, Apple has created a backdoor to make users' data accessible at the end of the day. Apple has assured that users can file an appeal in case their accounts have been suspended due to a misunderstanding.
