端到端加密
Search documents
Apple Sued Over Allegations of CSAM on iCloud
CNET· 2026-02-19 21:43
Core Viewpoint - Apple is facing a lawsuit from West Virginia Attorney General JB McCuskey over allegations that iCloud is being used to store and distribute child sexual abuse material (CSAM), with claims that Apple has been aware of this issue for years and has not taken appropriate action [1][5]. Group 1: Allegations and Evidence - The lawsuit includes alleged iMessage conversations between Apple executives acknowledging the presence of CSAM on iCloud as early as February 2020 [1][2]. - In these conversations, one executive reportedly stated that iCloud is "the greatest platform for distributing child porn" and suggested that Apple has chosen to remain ignorant of the extent of the CSAM issue [2]. - The number of CSAM reports made by Apple to the National Center for Missing and Exploited Children in 2023 was only 267, significantly lower than Google's 1.47 million and Meta's 30.6 million [3]. Group 2: CSAM Detection Tools and Encryption - The lawsuit claims that Apple failed to implement CSAM detection tools, including a proprietary scanning tool that was abandoned after an initial initiative in 2021 [4]. - Apple's Advanced Data Protection, which allows end-to-end encryption for photos and videos on iCloud, is alleged to hinder law enforcement efforts to identify and prosecute CSAM offenders [5]. - Apple has stated that its safety and privacy measures are designed with user protection in mind, including features like Communication Safety, which aims to protect children from CSAM content [6]. Group 3: Industry and Privacy Debate - The ongoing debate surrounding end-to-end encryption highlights the tension between privacy and security, particularly in relation to law enforcement and cybercrime [7]. - Privacy advocates have praised the introduction of encryption to iCloud, arguing that constant scanning for CSAM could lead to false positives and unwarranted investigations [8]. - The Electronic Frontier Foundation emphasized that blocking end-to-end encryption would undermine online security and privacy for all users, especially young people [9]. Group 4: Legal Context - The lawsuit was filed in the Circuit Court of Mason County, West Virginia, on February 19, 2024, following a class-action lawsuit in Northern California involving 2,680 plaintiffs who allege that Apple's inaction on CSAM scanning constitutes complicity in its distribution [10][11].
Meta sued over claims that WhatsApp messages are fully secure
The Economic Times· 2026-01-25 09:54
Core Viewpoint - An international group of plaintiffs has filed a lawsuit against Meta Platforms, Inc., alleging false claims regarding the privacy and security of WhatsApp chats, specifically challenging the company's assertions about end-to-end encryption [8]. Group 1: Lawsuit Details - The lawsuit was filed in the US District Court in San Francisco and targets Meta's claims that WhatsApp messages are protected by end-to-end encryption and cannot be accessed by the company [8]. - The plaintiffs include users from Australia, Brazil, India, Mexico, and South Africa, alleging that Meta stores user communications and that employees can access them [6][8]. - The lawsuit references information from "whistleblowers," although their identities and roles are not disclosed [7]. Group 2: Meta's Response - Meta has denied the allegations, labeling the lawsuit as frivolous and asserting that WhatsApp has been end-to-end encrypted using the Signal protocol for a decade [3][8]. - A spokesperson for Meta stated that any claim suggesting that WhatsApp messages are not encrypted is "categorically false and absurd" [3]. - The company plans to seek sanctions against the lawyers who filed the suit [3].
韩国电信巨头被调查:涉嫌隐瞒43台服务器遭黑客入侵事件,波及通话与短信安全,客户隐私面临泄露风险
Xin Lang Cai Jing· 2025-11-14 06:23
Group 1 - KT Corporation is under investigation by the National Intelligence Service (NIS) of South Korea for allegedly concealing significant security vulnerabilities [1][3] - From March to July 2024, 43 servers belonging to KT were infected with malware such as BPFDoor, which was not reported to the government [1][3] - The large-scale hacking incident has compromised the security of calls and text messages, raising concerns about customer privacy and potential data leaks [1][3] Group 2 - A report from NIS confirmed a tip-off regarding security vulnerabilities in encrypted messages using KT's network, which could lead to end-to-end encryption failure and data theft during transmission [3] - All small mobile communication base stations operated by KT use the same authentication certificate, which poses a risk if duplicated, allowing unauthorized access to KT's internal network [3] - The investigation is focusing on the causal relationship between the encryption vulnerability and the hacking incident, as well as confirming whether substantial data leaks and damages have occurred [3]