child pornography

Apple vs. UK — ADP E2EE Back Door Faceoff
Richi Jennings | | #nobackdoors, ADP, Apple, Apple Data Security, Apple iCloud, back door, backdoor, backdoors, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, cloud access, Compliance, CSAM, CSEM, E2EE, encryption, end-to-end encryption, five eyes, Five Eyes alliance, Five Eyes Intelligence Alliance, Government & Regulatory News, government access, Investigatory Powers Act, Privacy, SB Blogwatch, uk, UK Investigatory Powers Act, Won’t somebody think of the children?
Won’t Tim Think of the Children? End-to-end encryption battle continues ...
Security Boulevard

Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum
Richi Jennings | | #nobackdoors, ADP, Andy Biggs, Apple, Apple Data Security, Apple iCloud, back door, backdoor, backdoors, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, cloud access, Compliance, CSAM, CSEM, E2EE, encryption, end-to-end encryption, five eyes, Five Eyes alliance, Five Eyes Intelligence Alliance, Government & Regulatory News, government access, Investigatory Powers Act, Privacy, Ron Wyden, SB Blogwatch, Sen. Ron Wyden, Tulsi Gabbard, uk, Won’t somebody think of the children?
Just meet me at the ADP: Sen. Ron Wyden and Rep. Andy Biggs got no love for the United Kingdom ...
Security Boulevard

‘Terrorgram’ Telegram Terrorists Trash Transformers — Grid in Peril
Richi Jennings | | Anti-Terrorism, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child sexual exploitation, childpornography, Counter-Terrorism, counterterrorism, CSAM, Data encryption, E2EE, encryption, end-to-end encryption, extremism, france, ICS, ICS/SCADA systems, Pavel Durov, Privacy, Russia, SB Blogwatch, Telegram, Telegram app, Terrorgram, Terrorism, terrorist, terrorist attack, Terrorist attacks
Should’ve listened to Edison: After the arrest of Pavel Durov—the Telegram CEO—comes news of domestic extremists using the chat app to organize ...
Security Boulevard

EU Aims to Ban Math — ‘Chat Control 2.0’ Law is Paused but not Stopped
Richi Jennings | | Chat Control, Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, CSAM, CSEM, E2EE, encryption, end-to-end encryption, eu, Europe, European Compliance, european election, European Governments, European legislation, European Union, European Union (EU), SB Blogwatch, signal, WhatsApp, Won’t somebody think of the children?
Ongoing European Union quest to break end-to-end encryption (E2EE) mysteriously disappears ...
Security Boulevard

Elon’s CSAM FAIL: Twitter Fined by Australian Govt.
Richi Jennings | | Australia, Australian Government, Child Abuse, child exploitation, Child Online Safety, child porn, child pornography, Child protection, Child Safety, child security online, child sexual exploitation, childpornography, CSAM, Digital Trust and Safety, Elon Musk, elon musk twitter, eSafety Commission, grooming, Julie Inman Grant, Linda Yaccarino, SB Blogwatch, trust and safety, Twitter, X
Straya strikes back: Musk’s mob declines to answer questions, breaking law dunundah ...
Security Boulevard

Pics AND it Didn’t Happen: Sex Deepfake FBI Alert
Richi Jennings | | Adversarial machine learning, AI, AI (Artificial Intelligence), AI and machine learning, Artificial Intelligence, Artificial Intelligence (AI), Artificial Intelligence (AI)/Machine Learning (ML), child porn, child pornography, child sexual exploitation, childpornography, Deep Fake, Deep Fakery, Deep fakes, deepfake, deepfake videos, deepfakes, Evil Machine Learning, FBI, machine learning, Machine Learning security, porn, pornography, revenge porn, SB Blogwatch, sex, sextortion, sextortion scam, sextortionist, sexual harassment
Fake Pr0n Hint: Sextortionists stealing your innocent pictures to make AI nudes ...
Security Boulevard

Governments Try to Ban Encryption (Yet Again)
Richi Jennings | | Child Abuse, child exploitation, child porn, child pornography, child sexual exploitation, CSAM, encryption, end-to-end encryption, SB Blogwatch, signal, Threema, WhatsApp, Won’t somebody think of the children?
Déjà vu: Yet again, they’re tugging on the “think of the children” strings. But you can’t make math illegal ...
Security Boulevard
De-anonymizing Bitcoin
Bruce Schneier | | Bitcoin, child pornography, cryptocurrency, de-anonymization, tracing, Uncategorized
Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child porn ring. Within a few ...

Is Apple’s Client-Side Child Porn Scanning Legal?
Apple recently announced that it will start scanning devices individuals have purchased from Apple for both images that constitute child sexual abuse materials (CSAM) and for text messages or communications that are ...
Security Boulevard

Bill to Prevent Child Porn Could Kill Encryption
New legislation being introduced by Sen. Lindsay Graham ostensibly to prevent the spread of child porn and other child sexual abuse materials (CSAM) may have the effect of prohibiting the kinds of ...
Security Boulevard