this post was submitted on 05 Jan 2025
791 points (97.4% liked)

Privacy

32650 readers
338 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I have never liked Apple and lately even less. F.... US monopolies

you are viewing a single comment's thread
view the rest of the comments
[–] dustyData@lemmy.world 193 points 4 days ago (71 children)

Where's the "Apple is the only tech giant that respects your privacy" crowd? Just because your data isn't being publicly auctioned doesn't mean they aren't harvesting it and infringing on your privacy.

[–] deranger@sh.itjust.works 10 points 4 days ago* (last edited 4 days ago) (34 children)

It's not data harvesting if it works as claimed. The data is sent encrypted and not decrypted by the remote system performing the analysis.

From the link:

Put simply: You take a photo; your Mac or iThing locally outlines what it thinks is a landmark or place of interest in the snap; it homomorphically encrypts a representation of that portion of the image in a way that can be analyzed without being decrypted; it sends the encrypted data to a remote server to do that analysis, so that the landmark can be identified from a big database of places; and it receives the suggested location again in encrypted form that it alone can decipher.

If it all works as claimed, and there are no side-channels or other leaks, Apple can't see what's in your photos, neither the image data nor the looked-up label.

[–] Ebby@lemmy.ssba.com 8 points 4 days ago* (last edited 4 days ago) (14 children)

Wait, what?

So you take a pic, it's analysed, the analysis is encrypted, encrypted data is sent to a server that can deconstruct encrypted data to match known elements in a database, and return a result, encrypted, back to you?

Doesn't this sort of bypass the whole point of encryption in the first place?

Edit: Wow! Thanks everyone for the responses. I've found a new rabbit hole to explore!

[–] SliceableObstacle@jlai.lu 1 points 4 days ago

Maybe they "encrypt" it in jpg? XD

load more comments (13 replies)
load more comments (32 replies)
load more comments (68 replies)