{"id":42235,"date":"2021-08-09T21:37:09","date_gmt":"2021-08-09T21:37:09","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/"},"modified":"2021-08-09T21:37:09","modified_gmt":"2021-08-09T21:37:09","slug":"apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/","title":{"rendered":"Apple responds to critics of CSAM scan plan with FAQs &#8211; says it&#8217;d block governments subverting its system"},"content":{"rendered":"<p>Apple&#8217;s announcement last week that it will soon be scanning photos on iPhones and iPads that sync to iCloud for child sexual abuse material (CSAM) prompted pushback from thousands of security and privacy professionals and a response from the company that attempts to mollify its critics.<\/p>\n<p>The iDevice biz revealed two <a href=\"https:\/\/www.apple.com\/child-safety\/\" target=\"_blank\" rel=\"nofollow noopener\">child safety initiatives<\/a> that are initially being rolled out in the US and later in other countries depending on regulatory approval.<\/p>\n<p>One is a system to alert children and their parents when the Messages app sends or receives pictures deemed explicit (but not necessarily illegal) by an on-device machine learning algorithm.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The other is system to scan photos on iOS and iPadOS devices that sync to iCloud Photos to see if the hashes (identifiers) of on-device images match any hashes of known CSAM material (illegal), which Apple will use to flag iCloud accounts for cancellation and reporting to the National Center for Missing and Exploited Children (NCMEC).<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>Apple published a technical summary [<a href=\"https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf\" target=\"_blank\" rel=\"nofollow noopener\">PDF<\/a>] of its systems and said that for its CSAM scheme there&#8217;s only &#8220;a one in one trillion chance per year of incorrectly flagging a given account.&#8221; It, however, provided <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/twitter.com\/jonathanmayer\/status\/1423690035405201408?s=20\">no way to verify<\/a> that figure, according to Princeton professor Jonathan Mayer.<\/p>\n<h3 class=\"crosshead\"> <span>Went about as well as you&#8217;d expect<\/span><br \/>\n<\/h3>\n<p>The announcement [<a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.apple.com\/child-safety\/pdf\/Expanded_Protections_for_Children_Frequently_Asked_Questions.pdf\">PDF<\/a>] elicited a swift reaction in the form of <a href=\"https:\/\/appleprivacyletter.com\/\" target=\"_blank\" rel=\"nofollow noopener\">an open letter<\/a> opposing the move for its potential harm to privacy and security.<\/p>\n<p>&#8220;Apple&#8217;s current path threatens to undermine decades of work by technologists, academics and policy advocates towards strong privacy-preserving measures being the norm across a majority of consumer electronic devices and use cases,&#8221; said the letter, which currently lists more than 6,000 signatures. &#8220;We ask that Apple reconsider its technology rollout, lest it undo that important work.&#8221;<\/p>\n<p>Technical experts, privacy advocates, academics, and others have spent the past weekend debating the issue via social and online media. Pretty much everyone agrees that CSAM is a problem.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>The question is whether a company that has said, &#8220;Privacy is a human right&#8221; \u2013 even if it doesn&#8217;t offer that in China \u2013 should be attempting to tackle child safety by running its own scanning code \u2013 with consent obtained via the decision to use iCloud Photos rather than explicit permission \u2013 on its customers&#8217; devices.<\/p>\n<p>Alex Stamos, director of the Stanford Internet Observatory and former CSO of Facebook, attempted to stake out the middle ground between those horrified by Apple&#8217;s approach and those who would give the fight against CSAM priority over any other considerations.<\/p>\n<p>&#8220;In my opinion, there are no easy answers here,&#8221; wrote Stamos in a <a href=\"https:\/\/twitter.com\/alexstamos\/status\/1424054544556646407?s=20\" target=\"_blank\" rel=\"nofollow noopener\">Twitter thread<\/a>, insisting it&#8217;s okay to have nuanced opinions on these issues. &#8220;I find myself constantly torn between wanting everybody to have access to cryptographic privacy and the reality of the scale and depth of harm that has been enabled by modern comms technologies.&#8221;<\/p>\n<p>He said he&#8217;s happy to see Apple finally take some responsibility for the impact of its massive platform but is also frustrated with its approach. &#8220;They both moved the ball forward technically while hurting the overall effort to find policy balance.&#8221;<\/p>\n<p>Stamos has <a href=\"https:\/\/twitter.com\/alexstamos\/status\/1424054578438307840?s=20\" target=\"_blank\" rel=\"nofollow noopener\">speculated<\/a> this system could allow Apple to introduce end-to-end encryption for iCloud backups by preempting the inevitable concern about CSAM that would come up if it did so. Apple however had not publicly stated any intention to deploy full iCloud encryption.<\/p>\n<h3 class=\"crosshead\"> <span>All down to Apple<\/span><br \/>\n<\/h3>\n<p>On Monday, Eric Rescorla, CTO of Mozilla, published <a href=\"https:\/\/educatedguesswork.org\/posts\/apple-csam-intro\/\" target=\"_blank\" rel=\"nofollow noopener\">a technical analysis of Apple&#8217;s system<\/a> that suggests the security of the company&#8217;s CSAM scanning effort depends on Apple behaving in a trustworthy manner. &#8220;It&#8217;s important to realize that there&#8217;s nothing in the system that prevents Apple from scanning photos that never leave the device; they&#8217;ve just chosen not to do so,&#8221; he wrote.<\/p>\n<p>Apple&#8217;s &#8220;child safety&#8221; initiative represents a major shift for the company that just a few years ago cited the importance of &#8220;personal safety&#8221; by rejecting the FBI&#8217;s request that it modify its software <a href=\"https:\/\/www.theregister.com\/2017\/11\/20\/warrant_texas_shooter_iphone\/\" target=\"_blank\" rel=\"noopener\">to decrypt the iPhone of a terror suspect<\/a>.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>In <a href=\"https:\/\/www.apple.com\/customer-letter\/\" target=\"_blank\" rel=\"nofollow noopener\">an open letter<\/a> to its customers in 2016, Apple explained its defense of privacy by stating, &#8220;we believe the contents of your iPhone are none of our business.&#8221;<\/p>\n<p>&#8220;Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation,&#8221; the company said. &#8220;In the wrong hands, this software \u2013 which does not exist today \u2013 would have the potential to unlock any iPhone in someone\u2019s physical possession.&#8221;<\/p>\n<p>Starting with forthcoming operating system updates iOS 15, iPadOS 15, watchOS 8, and macOS Monterey, the contents of your iPhone will be Apple&#8217;s business if you sync images to iCloud.<\/p>\n<p>Security experts are concerned Apple&#8217;s system will allow government authorities to demand that the company add non-CSAM image hashes to its detection list to ferret out photos deemed unacceptable for political, religious, or other reasons unrelated to child safety.<\/p>\n<p>Five years ago, Apple said the government could be expected to demand that sort of technical intervention in a legal filing [<a href=\"https:\/\/www.eff.org\/files\/2016\/03\/15\/apple-reply-to-govt-opposition-to-apple-motion-to-vacate.pdf\" target=\"_blank\" rel=\"nofollow noopener\">PDF<\/a>] opposing the FBI&#8217;s request to modify its software.<\/p>\n<p>&#8220;Here, if Apple is forced to create software in this case, other law enforcement agencies will seek similar orders to help them hack thousands of other phones, as FBI Director Comey confirmed when he said he would &#8216;of course&#8217; use the All Writs Act to &#8216;return to the courts in future cases to demand that Apple and other private companies assist . . . in unlocking secure devices,'&#8221; explained the company&#8217;s legal representatives.<\/p>\n<h3 class=\"crosshead\"> <span>Would Apple cave?<\/span><br \/>\n<\/h3>\n<p>Yet in the FAQs published on Monday, Apple attempts to ally concern that authorities could demand access to its CSAM system for other surveillance purposes by stating that the company would simply resist. &#8220;Could governments force Apple to add non-CSAM images to the hash list?&#8221; Apple asks, and then answers, &#8220;Apple will refuse any such demands.&#8221;<\/p>\n<p>Legal experts have not been impressed. &#8220;So basically: all that stands between users and governments demanding [the addition] of non-CSAM images to the hash list is Apple&#8217;s firm refusal?&#8221; said Elizabeth Joh, law professor at UC Davis, <a href=\"https:\/\/twitter.com\/elizabeth_joh\/status\/1424737315864289283?s=20\" target=\"_blank\" rel=\"nofollow noopener\">via Twitter<\/a>.<\/p>\n<p>To which Daphne Keller, Platform Regulation Director, Stanford Cyber Policy Center, and former Associate General Counsel at Google, <a href=\"https:\/\/twitter.com\/daphnehk\/status\/1424765665320214529?s=20\" target=\"_blank\" rel=\"nofollow noopener\">replied<\/a>, &#8220;Speaking as someone who has litigated and lost on this exact issue in three countries (UK, Germany, France), I feel confident in saying the firm refusal to filter for new things beyond CSAM doesn\u2019t mean much in the face of state power.&#8221;<\/p>\n<p>Indeed, when China directed Apple to enforce its ban on VPN software, the company <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.reuters.com\/article\/us-china-apple-vpn\/apple-says-it-is-removing-vpn-services-from-china-app-store-idUSKBN1AE0BQ\">complied<\/a>.<\/p>\n<p>But there&#8217;s a more basic concern about Apple&#8217;s utilization of its customers&#8217; devices in a way that might be used against them: ownership and control. Ben Thompson, a business analyst who writes the <a href=\"https:\/\/stratechery.com\/2021\/apples-mistake\/\" target=\"_blank\" rel=\"nofollow noopener\">Stratechery blog<\/a>, described Apple&#8217;s approach as a mistake.<\/p>\n<p>&#8220;One\u2019s device ought to be one\u2019s property, with all of the expectations of ownership and privacy that entails; cloud services, meanwhile, are the property of their owners as well, with all of the expectations of societal responsibility and law-abiding which that entails,&#8221; he wrote.<\/p>\n<p>&#8220;It\u2019s truly disappointing that Apple got so hung up on its particular vision of privacy that it ended up betraying the fulcrum of user control: being able to trust that your device is truly yours.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/08\/09\/apple_csam_faq\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Offer may not apply in China, or anywhere else warn experts Apple&#8217;s announcement last week that it will soon be scanning photos on iPhones and iPads that sync to iCloud for child sexual abuse material (CSAM) prompted pushback from thousands of security and privacy professionals and a response from the company that attempts to mollify its critics.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-42235","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple responds to critics of CSAM scan plan with FAQs - says it&#039;d block governments subverting its system 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple responds to critics of CSAM scan plan with FAQs - says it&#039;d block governments subverting its system 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-09T21:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple responds to critics of CSAM scan plan with FAQs &#8211; says it&#8217;d block governments subverting its system\",\"datePublished\":\"2021-08-09T21:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/\"},\"wordCount\":1256,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/\",\"name\":\"Apple responds to critics of CSAM scan plan with FAQs - says it'd block governments subverting its system 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-08-09T21:37:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple responds to critics of CSAM scan plan with FAQs &#8211; says it&#8217;d block governments subverting its system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple responds to critics of CSAM scan plan with FAQs - says it'd block governments subverting its system 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/","og_locale":"en_US","og_type":"article","og_title":"Apple responds to critics of CSAM scan plan with FAQs - says it'd block governments subverting its system 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-09T21:37:09+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple responds to critics of CSAM scan plan with FAQs &#8211; says it&#8217;d block governments subverting its system","datePublished":"2021-08-09T21:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/"},"wordCount":1256,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/","url":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/","name":"Apple responds to critics of CSAM scan plan with FAQs - says it'd block governments subverting its system 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2021-08-09T21:37:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YRHr5b45EwIEiVphXXZUgAAAAJQ&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-responds-to-critics-of-csam-scan-plan-with-faqs-says-itd-block-governments-subverting-its-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple responds to critics of CSAM scan plan with FAQs &#8211; says it&#8217;d block governments subverting its system"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42235"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42235\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42235"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42235"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}