Hacker News new | past | comments | ask | show | jobs | submit login

> This client side scanning of local files can be easily extended to scan the whole device

Correct, Apple can access unencrypted files stored on your device.

> That's why the eff was calling it a backdoor

Accessing unencrypted files on a device is not a backdoor

> actively reporting any suspicious looking files to the authority all the time on its own

Yep, that's a problem. Not a backdoor, though.




What is your deal. You are out here arguing in bad faith all over this thread. What is your motivation?


What's the bad faith? What's single thing have I said that is incorrect? It's not breaking E2E encryption. No one is locking people up for political photos. It's not using facial recongition.

I don't like FUD driving discussions. I think we need to have serious discussions about this technology. I think people that don't understand it shouldn't participate....


> It's not breaking E2E encryption.

It's not breaking it, but it is rendering it moot. Why even bother with E2E encryption if you can't trust your endpoint? Would upgrading your exterior door's security protect you from theft if it's your roommate who's stealing from you?

> No one is locking people up for political photos.

Authoritarian dictatorships like China are, and they'd love to use this tool to help them with that.


You have repeatedly misrepresented other people's viewpoints in order to win this argument. Maybe you have completely misunderstood what the discussion is about, but since you're doing it repeatedly and have been called on it multiple times, it is fair for others to assume bad faith.


Breaking encryption is not a "requirement" of a backdoor.


> Accessing unencrypted files on a device is not a backdoor

In what weird universe is this even remotely true?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: