Hacker And The Fed cover image

Thousands of Intelligence and Defense Employees Exposed, a Hacker Infects His Own Computer, Google Accuses Apple Employee of Not Reporting a Zero-day

Hacker And The Fed

CHAPTER

The Future of Privacy

The FBI and other law enforcement agencies around the world have come up with the CSAM hash numbers, meaning that they know this is a child exploitation picture. If one of those hashes matches these known CSAM hash files, then it can be flagged that your file contains a child exploitation. The next issue is going to be accuracy. Apple's hashing system, though, what they were using for identifying potentially bad images, they were actually using something called neural hash. It would create a collision between images or between files.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner