The Deceptive PR Behind Apple’s “Expanded Protections for Children”

My wife is pretty tech-savvy. While not a software engineer and not a computer scientist, she has a good understanding of computing technologies, statistics, formal methods, and an intuitive (but quickly growing) grasp of machine learning. She’s also able to code in R for her research, and she’s highly addicted to her iPhone 12 Mini, her iPad Pro, and her 12” MacBook, despite its slowly but steadily failing keyboard. With all this being said, I spent about 30 minutes yesterday evening trying to explain to her, what’s all the fuss about Apple’s new CSAM (child sexual abuse material) prevention features that are being introduced in iOS 15.

The point of the anecdote is of course not to show that my wife is dim, but rather to illustrate the issue with said CSAM features. In contrast to how easy it is to explain to “an average Joe” why Google’s or Facebook’s business models pose a threat to people’s privacy, it’s very hard to explain why Apple’s new mechanism is even worse.

Actually, as I was working on a draft of this post, Matthew Green and Alex Stamos wrote an op-ed in the New York Times that makes a good attempt at trying to concisely explain the issue to a non-technical audience. There’s hope.

I don’t want this blog post to be an exhaustive explanation of what exactly Apple is planning to do, because many other excellent articles have already been written about it over the last week. In essence, iOS 15 will introduce a mechanism that allows for checking user’s photographs against a CSAM content database, and this will happen on the device. That’s the big difference between Apple’s approach and what every other company that hosts big libraries of photographs online has been doing for a while now. A paragraph from Ben Thompson’s article that was published yesterday sums it up pretty well:

(…) instead of adding CSAM-scanning to iCloud Photos in the cloud that they own and operate, Apple is compromising the phone that you and I own and operate, without any of us having a say in the matter. Yes, you can turn off iCloud Photos to disable Apple’s scanning, but that is a policy decision; the capability to reach into a user’s phone now exists, and there is nothing an iPhone user can do to get rid of it.

You could of course say that it’s “a slippery slope” sort of argument, and that we should trust Apple that it won’t use the functionality for anything else. Setting aside the absurdity of trusting a giant, for-profit corporation over a democratically-elected government, we should bear in mind that Apple’s record here is much less stellar than they’d like us to think. The company is already cooperating with the Chinese government, e.g., by storing personal data of Chinese citizens only on servers run by a Chinese company, and has previously cancelled their plans for iCloud backups encryption under the pressure of FBI. Apple released an FAQ document yesterday in which it tried to clarify and address the issues, but if anything, they confirmed what we all assumed to be true: that the only thing stopping any government agency or other malicious actor from substituting some other image hashes (e.g., photographs of homosexual couples in countries where homosexuality is illegal) for CSAM, is Apple’s internal policy. The technology that would allow that to happen is already there.

Those posters won’t age well, will they.

In the world of computer security this technology has a name, it’s called “a backdoor.” A well-documented and well-intended backdoor, but still a backdoor. Installed and enabled by default on millions of devices around the world.

So why on Earth would Apple, a company that’s been building a brand as privacy-protecting over the last few years, go for such a solution? And why now?

The hypothesis that I have is that Apple wishes to distance itself from checking users’ data. They’ve been fighting with the FBI and the federal government for years, they’ve been struggling with not reporting CSAM content to the NCMEC, they don’t want to be involved in any of this anymore. They want to create a situation in which they could offer end-to-end encryption for iMessage, iCloud Drive, iCloud Photo Library and iCloud Backups, and at the same time remain compliant. This might be the only way to have your cake and eat it, too, in fact. And it gets better: due to how the mechanism is implemented, Apple will never see the actual user data. It will only know whether there’s a match against the data on the phone and the data on the server, so in its own marketing campaigns they can still claim to respect the user’s privacy. And if this mechanism ever gets used for anything else, they can always claim that they are simply complying with local regulations, and that they themselves neither censor nor even look at the data on their users’ phones.

Sadly, due to the intrinsically technical nature of the problem, which I mentioned in the first paragraphs of this article, I believe the public will buy it, and during the next public Apple event Tim Cook will triumphantly announce some privacy-enhancing features, like protecting your personal data against cross-app tracking or offering VPN-like, anonymized connection for Safari or Apple Mail. All this, while there’s a backdoor installed on your phone, and you can do nothing about it.


It pains me as a self-proclaimed Apple fanboy, a loyal customer of many years and even an evangelist of the brand to see the company making a step in such a dangerous direction.

The worst part is: how do I put my money where my mouth is? Am I going back to using Linux on the desktop (2022 will be the year of Linux on the desktop, remember), debugging wifi drivers and tirelessly trying to make resume-from-suspend work? Am I getting a Pixel and putting GrapheneOS on it like a total nerd? FUCK.

I can only hope that the backlash caused by the screeching voice of the minority, will make Apple nonetheless reconsider, and perhaps change the implementation in future versions of iOS. 

Discussion on HackerNews.

Published by Piotr Kaźmierczak

I like jazz and cycling.

Join the Conversation

13 Comments

  1. I’ve increasingly realized that if it’s not truly open source, it’s not to be trusted.

    What we are subjected to is domestication of users. The same thing Whatsapp (Facebook) did some time ago, Apple are doing now (and have been doing for quite some time). We, as users, can accept that, or move to an alternative before the alternative becomes yet another corp that tries to shove their load at us and tell us that we need to like it.

    1. Exactly. I have been using Linux for 10 years and it has been working really well! Common hardware (Intel/AMD cpu, iGPU) works out of the box. It is always a good idea to check linux compatibility in advance, though. Especially peripherials like printers, scanners, etc. And decide whether you like Gnome or KDE more. For example I like KDE more and I use Arch Linux. Arch takes a bit more time and skill to install but it has an awesome and helpful wiki and you will get a lot of bleeding-edge software, it is more suited for developers. Other rpm and deb distros are often easier to install and use but sometimes it can be a difficult to get latest versions of some software.

  2. Hey desktop Linux lovers, I didn’t mean to offend or upset you. I am in fact a desktop Linux lover myself, I genuinely love and respect the work of FOSS contributors and the spirit of the community. This paragraph about Linux/Graphene was supposed to convey a message that it’s not a path for everyone. That it’s not a solution to the problem, because a lot of people won’t go down that road and they won’t even know about the risks due to Apple’s genius PR.

    We need secure solutions from mainstream platform providers, like Apple, Google, Microsoft, Facebook.

  3. “debugging wifi drivers and tirelessly trying to make resume-from-suspend work” what year do you think this is? 2008?

Leave a comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.