contador javascript Saltar al contenido
Contact : alejandrasalcedo0288@gmail.com

Apple automatically scans the iCloud photo library for child abuse

The arrival of consumer technology is a reality, and thanks to it it has been possible that we can perform daily actions, consult a map, find a restaurant or send a photo in a message. However, everything has a negative face, since child abuse is often embodied in digital media. Sad news that shakes us from time to time and that They have mobile devices as protagonists.

The profusion of more and more discreet phones and with better image quality makes them used by unscrupulous people to register and photograph minors, the most vulnerable group. However, there is some light in all this, since Apple seems to have taken seriously This problem, trying to put their means so that those who take these photographs are located and put at the disposal of justice.

iPhone X

It may interest you | So you can add trackpad gestures to your Magic Mouse 2

As we have known through a British media, Jane Horvath, director of privacy at Apple, has stated at CES 2020 held in Las Vegas, that the company uses detection technology to Look for illegal images. It seems that Apple disables accounts if Apple finds evidence of child exploitation material, although it does not specify how it discovers it.

"Apple is dedicated to protecting children throughout our ecosystem wherever our products are used, and we continue to support innovation in this space."

Those of Cupertino have not given more details on how they verify the images of child abuse, but many technology companies use a filtering system called PhotoDNA, in which these photographs are compared with a database of previously identified images using a technology known as "hashing". This technique is also used by social networks such as Facebook, Twitter, in addition to Google.

In addition, Apple takes privacy more seriously than anyone with device encryption, since according to Horvath, β€œThe phones are relatively small, they are lost and stolen. We have to make sure that if you remove that device you are not exposing your data. ”