MEPs block tech firms from scanning for child sexual abuse material | POLITICO

“perhaps there’s a different approach they could try taking, other than surveilling everybody’s messages?”

Dropsafe
MEPs block tech firms from scanning for child sexual abuse material | POLITICO
https://alecmuffett.com/article/151666
#ChatControl #ClientSideScanning #EndToEndEncryption #csam #surveillance
MEPs block tech firms from scanning for child sexual abuse material | POLITICO

“perhaps there’s a different approach they could try taking, other than surveilling everybody’s messages?”

Dropsafe

MEPs block tech firms from scanning for child sexual abuse material | POLITICO

“perhaps there’s a different approach they could try taking, other than surveilling everybody’s messages?”

https://www.politico.eu/article/european-parliament-rejects-child-sexual-abuse-bill-blocking-tech-firms-scanning-meta-google/

#chatControl #clientSideScanning #csam #endToEndEncryption #surveillance
MEPs block tech firms from scanning for child sexual abuse material

Scanning for child abuse content will become illegal in Europe after April 3.

POLITICO
Let Me Explain How a State Actor Could Perform a Denial-of-Service Attack on the Entire UK Government in the Wake of Ofcom “Online Safety Act” Client-Side Scanning
https://alecmuffett.com/article/150401
#ClientSideScanning #NationalSecurity #OnlineSafetyAct #PhotoDna #censorship #surveillance
Let Me Explain How a State Actor Could Perform a Denial-of-Service Attack on the Entire UK Government in the Wake of Ofcom “Online Safety Act” Client-Side Scanning

1/ obtain a hash of abuse material that’s both known & banned; if pervasive as claimed this shouldn’t be hard 2/ use algorithms from this paper to create a cat meme with the same ha…

Dropsafe

Let Me Explain How a State Actor Could Perform a Denial-of-Service Attack on the Entire UK Government in the Wake of Ofcom “Online Safety Act” Client-Side Scanning

1/ obtain a hash of abuse material that’s both known & banned; if pervasive as claimed this shouldn’t be hard

2/ use algorithms from this paper to create a cat meme with the same hash

3/ send the cat meme to all MPs & Civil Servants via SMS, E-Mail, WhatsApp (bonus if it goes viral)

4/ watch as MPs are locked out & banned by platforms for possessing abusive material, preventing government

Also: there is no mitigation by saying “all of these cases should be appealed” because by the time enough resources have been deployed to resolve the appeal claims, government will have been offline for 12 hours or more.

Of course one could propose mitigations: the government could ex-ante inform all platform providers which accounts needed to be prevented from ever being blocked – to be given special treatment – however:

  • Politically that will not fly well, and…
  • It will immediately cast doubt upon any politician who has an unacknowledged backup social media profile, which will be visible to the platforms of course because of device cookie sharing and things like that, so…
  • Such information will be a topic of extortion or leaks
  • Also, there will be claims of “two-tier surveillance” and so forth.

    White-Box Attacks on PhotoDNA Perceptual Hash Function

    https://eprint.iacr.org/2026/486

    [*] note: strictly, it is not necessary to obtain the material, merely the hash; therefore a leak of the existing database of hashes – several million in size – would be catastrophic by providing material for an infinite sequence of attacks like this.

    #censorship #clientSideScanning #nationalSecurity #onlineSafetyAct #photoDna #surveillance
    White-Box Attacks on PhotoDNA Perceptual Hash Function

    𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 is a widely deployed perceptual hash function used for the detection of illicit content such as Child Sexual Abuse Material (CSAM). This paper presents the first mathematical description of 𝐴𝑙𝑙𝑒𝑔𝑒𝑑 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴, a new function which has identical outputs to that of 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 for a large database of test images. From this description, several design weaknesses are identified: the algorithm is piece-wise linear and differentiable, the hash value only depends on the sum of the RGB values of each pixel, and it is trivial to find images with hash value equal to all zeroes. The paper further demonstrates that gradient-based optimization techniques and quadratic programming can exploit the mathematical weaknesses of 𝐴𝑙𝑙𝑒𝑔𝑒𝑑 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 and 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 to produce visually appealing exact collisions and second preimages; for near-collisions and near-second-preimages the image quality can be further improved. The same techniques can be used to recover the rough shapes of an image from its hash value, disproving the claim from the designer that 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 is irreversible. Finally, it is also shown that it is easy to produce high-quality perceptually identical images with a hash value that is far from the original image allowing to avoid detection. We have implemented our attacks on a large set of varied images and we have tested them on both 𝐴𝑙𝑙𝑒𝑔𝑒𝑑 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 and 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴. Our attacks have success rates close or equal to 100% and run in seconds or minutes on a personal laptop; they present a substantial improvement over earlier work that requires hours on parallel machines and that results only in near-collisions. We believe that with additional optimization of the parameters, the image quality and/or the attack performance can be further improved. Our work demonstrates that 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 is unreliable for the detection of illicit content: it is easy to incriminate someone by sending them false content with a hash value close to illicit content (a false positive) and to avoid detection of illicit content with minimal modifications to an image (a false negative). False positives and leakage of information are particularly problematic in a Client Side Scanning (CSS) scenario as envisaged by several countries, where large hash databases would be stored on every user device and billions of images would be hashed with 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴 every day. Overall, our research cast serious doubts on the suitability of 𝑃ℎ𝑜𝑡𝑜𝐷𝑁𝐴for the large-scale detection of illicit content.

    IACR Cryptology ePrint Archive
    Call me pessimistic, but I think we just have to make peace with the fact that the internet we've known for the past 30 years is coming to an end and we're entering a full on fascist surveillance state.

    We should make our preparations for this now and not right before the legislation takes effect.

    I'd like for things to work out and these bills either fail to pass or get struck down in court but I feel that ain't going to happen. So many people will get hurt because of this.

    #Privacy #FreeSpeech #Censorship #DigitalRights #Internet #SocialMedia #KOSA #KidsOnlineSafetyAct #AgeVerification #ClientSideScanning #US #UnitedStates

    RE: https://sharkey.world/notes/ak1wfxs7bm0m0001
    Well, looks like we can't rely on Ted Cruz stonewalling bills anymore. They want to proceed with the Kids Online Safety Act, Children and Teens' Online Privacy Protection Act, and Kids Off Social Media Act (at minimum). Cruz wants to advance these bills "within the next six weeks" (i.e. factoring in recesses, it will either be the week of April 13th or the week of April 20th). I have no idea if Cruz is siding with the Senate version or the House version of KOSA as last I checked, he was on the fence (there will clearly be negotiation/butting heads as the two versions differ drastically).

    This has a greater chance of proceeding as scheduled as Cruz is the chairman of the Senate Commerce Committee. Though it could be delayed if the previous two calls for votes are anything to go by (Blumenthal wanted a vote on KOSA by late 2025 and Graham wanted a vote on various "child safety" bills back in February).

    Please call your Senators and Representatives ASAP!

    #Privacy #FreeSpeech #Censorship #DigitalRights #Internet #SocialMedia #KOSA #KidsOnlineSafetyAct #AgeVerification #ClientSideScanning #US #UnitedStates

    https://www.politico.com/live-updates/2026/03/12/congress/cruz-seeks-to-advance-senate-kids-privacy-proposals-in-next-six-weeks-00825098
    Cruz seeks to advance Senate kids’ safety proposals in next 6 weeks - Live Updates - POLITICO

    The Senate earlier this month advanced the Children and Teens’ Online Privacy and Protection Act by unanimous consent.

    Politico
    There is an entire genre of tricking AI customer service bots into doing work; but few are pointing out the obvious… https://alecmuffett.com/article/149128 #ClientSideScanning #OnlineSafety #ai #censorship #surveillance

    There is an entire genre of tr...
    There is an entire genre of tricking AI customer service bots into doing work; but few are pointing out the obvious…

    …that this is how all censorship circumvention works, and that content scanning will inevitably fail in the face of focused ingenuity.

    Dropsafe
    There is an entire genre of tricking AI customer service bots into doing work; but few are pointing out the obvious…
    https://alecmuffett.com/article/149128
    #ClientSideScanning #OnlineSafety #ai #censorship #surveillance
    There is an entire genre of tricking AI customer service bots into doing work; but few are pointing out the obvious…

    …that this is how all censorship circumvention works, and that content scanning will inevitably fail in the face of focused ingenuity.

    Dropsafe

    There is an entire genre of tricking AI customer service bots into doing work; but few are pointing out the obvious…

    …that this is how all censorship circumvention works, and that content scanning will inevitably fail in the face of focused ingenuity.

    https://twitter.com/om_patel5/status/2032248004443287962?s=20

    #ai #censorship #clientSideScanning #onlineSafety #surveillance
    Om Patel (@om_patel5) on X

    stop spending money on Claude Code. Chipotle's support bot is free:

    X (formerly Twitter)