I’m not sure what kind of algorithm they could use to find CSAM.

sauce

    • Rikudou_Sage@lemmings.world
      link
      fedilink
      arrow-up
      3
      ·
      4 days ago
      1. bully OS providers into compliance, Google/Apple knows which apps you have installed and which apps you open.

      2. assume anyone using VPN or Tor or similar is suspicious, with deep packet inspection you can get a lot of information - even if it looks like nonsense data, you absolutely can infer patterns if you have enough data.

    • killingspark@feddit.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      4 days ago

      Pretty much every messenger is built around a central server. Tracing connections to that server is not without hassle but doable with government resources. Now, a Briar-Style P2P Network could work but that has it’s own problems. Central servers are popular for a reason.

        • Rikudou_Sage@lemmings.world
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          4 days ago

          You need to send a lot of metadata unencrypted for decentralised e2ee to work.

          Compare metadata leak between centralised Signal (which goes to impressive lengths to know as little as possible about you) and decentralised Matrix.

          • Valmond@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            4 days ago

            That’s just not true, you can obviously use encrypted communications all along, even for discovery. Why on earth would you?