Hacker And The Fed cover image

Thousands of Intelligence and Defense Employees Exposed, a Hacker Infects His Own Computer, Google Accuses Apple Employee of Not Reporting a Zero-day

Hacker And The Fed

00:00

The Future of Privacy

The FBI and other law enforcement agencies around the world have come up with the CSAM hash numbers, meaning that they know this is a child exploitation picture. If one of those hashes matches these known CSAM hash files, then it can be flagged that your file contains a child exploitation. The next issue is going to be accuracy. Apple's hashing system, though, what they were using for identifying potentially bad images, they were actually using something called neural hash. It would create a collision between images or between files.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app