▲ | gjsman-1000 2 days ago | ||||||||||||||||
I think you're confusing technical encryption with the privacy of encryption. For example, let's say I implemented a CSAM-scanning AI model in my chat app, which runs locally against your message, before communicating the message over an encrypted HTTPS channel. If the message is flagged, it can be sent over an encrypted HTTPS channel to authorities, on a secondary separate connection. At no point, did it leave the device, in unencrypted form. Is that message encrypted? Yes. The way that you want? No. Governments have recognized this distinction, and have figured out they can have their cake and eat it too; the security of encryption with none of the privacy. | |||||||||||||||||
▲ | fruitworks 2 days ago | parent | next [-] | ||||||||||||||||
>If the message is flagged, it can be sent over an encrypted HTTPS channel to authorities okay, but how do you prevent me from intercepting that communication. Or even running my own copy of the local model and determing ahead of time whether it will trip the alarm. If the attacker has access to the model, they can effectively make a GAN to modify images to get past the filter. | |||||||||||||||||
| |||||||||||||||||
▲ | nicce 2 days ago | parent | prev | next [-] | ||||||||||||||||
> In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. From Wikipedia. They can’t have their cake. You are breaking the concept of information into smaller steps (e.g. message) when that is against the definition. | |||||||||||||||||
| |||||||||||||||||
▲ | Terr_ 2 days ago | parent | prev | next [-] | ||||||||||||||||
Another example of such degenerate-encryption would be having messages "end-to-end" encrypted, but a copy of the key is kept by a service-provider or even sent in advance to a government agency. | |||||||||||||||||
▲ | zappb 2 days ago | parent | prev [-] | ||||||||||||||||
People usually mean "end to end encryption" in these situations, and by adding a third "end" to the system, you bypass the whole point of end to end encryption. | |||||||||||||||||
|