
Thousands of Intelligence and Defense Employees Exposed, a Hacker Infects His Own Computer, Google Accuses Apple Employee of Not Reporting a Zero-day
Hacker And The Fed
The Future of Privacy
The FBI and other law enforcement agencies around the world have come up with the CSAM hash numbers, meaning that they know this is a child exploitation picture. If one of those hashes matches these known CSAM hash files, then it can be flagged that your file contains a child exploitation. The next issue is going to be accuracy. Apple's hashing system, though, what they were using for identifying potentially bad images, they were actually using something called neural hash. It would create a collision between images or between files.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.