abusesaffiliationarrow-downarrow-leftarrow-rightarrow-upattack-typeblueskyburgerchevron-downchevron-leftchevron-rightchevron-upClock iconclosedeletedevelopment-povertydiscriminationdollardownloademailenvironmentexternal-linkfacebookfilterflaggenderglobeglobegroupshealthC4067174-3DD9-4B9E-AD64-284FDAAE6338@1xinformation-outlineinformationinstagraminvestment-trade-globalisationissueslabourlanguagesShapeCombined Shapeline, chart, up, arrow, graphLinkedInlocationmap-pinminusnewsorganisationotheroverviewpluspreviewArtboard 185profilerefreshIconnewssearchsecurityPathStock downStock steadyStock uptagticktooltiptwitteruniversalitywebwhatsappxIcons / Social / YouTube
Article

10 Aug 2021

Author:
Access Now

Access Now urges Apple to roll back plans to circumvent end-to-end encryption on its devices

[Apple's system updates]... aim to help limit the spread of Child Sexual Abuse Material (CSAM)... However, the measures... put everyone’s privacy and security at risk by circumventing end-to-end encryption and reducing individuals’ control over their own device...

Apple’s new technology... will give Apple devices the ability... to scan images stored in iCloud Photos in an attempt to identify CSAM. The company plans to update the operating system software... to include a database of image hashes — based on hashes of known CSAM provided by the National Center for Missing and Exploited Children (NCMEC)... and “other child safety organizations” — as well as a machine learning mechanism (about which we know little) to compare the hash of images on the device being uploaded to iCloud...

[Apple] will also introduce a feature for message monitoring on childrens’ accounts which can be activated when parents opt in... [M]inors in vulnerable communities, including the LGBTQ+ community, with unsupportive parents, are most likely to bear the brunt of these changes...

The inevitable risk of erroneous flagging, alongside the potential for continuously expanding monitoring... raises serious concerns...

We strongly urge Apple to roll back its plan to implement client-side scanning, and refrain from implementing any technological measures that will... undermine end-to-end encryption... Apple should engage in sustained consultations with civil society organizations and individuals impacted... to understand their real-world impact, and implement measures that will meaningfully guard privacy and empower users.

Timeline

Privacy information

This site uses cookies and other web storage technologies. You can set your privacy choices below. Changes will take effect immediately.

For more information on our use of web storage, please refer to our Data Usage and Cookies Policy

Strictly necessary storage

ON
OFF

Necessary storage enables core site functionality. This site cannot function without it, so it can only be disabled by changing settings in your browser.

Analytics cookie

ON
OFF

When you access our website we use Google Analytics to collect information on your visit. Accepting this cookie will allow us to understand more details about your journey, and improve how we surface information. All analytics information is anonymous and we do not use it to identify you. Google provides a Google Analytics opt-out add on for all popular browsers.

Promotional cookies

ON
OFF

We share news and updates on business and human rights through third party platforms, including social media and search engines. These cookies help us to understand the performance of these promotions.

Your privacy choices for this site

This site uses cookies and other web storage technologies to enhance your experience beyond necessary core functionality.