Apple Says Will Implement System That Will Check iPhone Handsets for Images of Child Sexual Abuse

Apple says the detection of child abuse image uploads sufficient to guard against false positives will trigger a human review.

Advertisement
By Reuters | Updated: 6 August 2021 09:18 IST
Highlights
  • The system could open the door to monitoring of political speech
  • Apple has implemented that database using a technology called NeuralHash
  • iPhone will create a hash of the image to be uploaded

Apple's new system seeks to address requests from law enforcement to help stem child sexual abuse

Apple on Thursday said it will implement a system that checks photos on iPhone devices in the United States before they are uploaded to its iCloud storage services to ensure the upload does not match known images of child sexual abuse.

Detection of child abuse image uploads sufficient to guard against false positives will trigger a human review of and report of the user to law enforcement, Apple said. It said the system is designed to reduce false positives to one in one trillion.

Apple's new system seeks to address requests from law enforcement to help stem child sexual abuse while also respecting privacy and security practices that are a core tenet of the company's brand. But some privacy advocates said the system could open the door to monitoring of political speech or other content on iPhone handsets.

Advertisement

Most other major technology providers - including Alphabet's Google, Facebook, and Microsoft - are already checking images against a database of known child sexual abuse imagery.

Advertisement

"With so many people using Apple products, these new safety measures have lifesaving potential for children who are being enticed online and whose horrific images are being circulated in child sexual abuse material," John Clark, chief executive of the National Center for Missing & Exploited Children, said in a statement. "The reality is that privacy and child protection can co-exist."

Here is how Apple's system works. Law enforcement officials maintain a database of known child sexual abuse images and translate those images into "hashes" - numerical codes that positively identify the image but cannot be used to reconstruct them.

Advertisement

Apple has implemented that database using a technology called "NeuralHash", designed to also catch edited images similar to the originals. That database will be stored on iPhone gadgets.

When a user uploads an image to Apple's iCloud storage service, the iPhone will create a hash of the image to be uploaded and compare it against the database.

Advertisement

Photos stored only on the phone are not checked, Apple said, and human review before reporting an account to law enforcement is meant to ensure any matches are genuine before suspending an account.

Apple said users who feel their account was improperly suspended can appeal to have it reinstated.

The Financial Times earlier reported some aspects of the programme.

One feature that sets Apple's system apart is that it checks photos stored on phones before they are uploaded, rather than checking the photos after they arrive on the company's servers.

On Twitter, some privacy and security experts expressed concerns the system could eventually be expanded to scan phones more generally for prohibited content or political speech.

Apple has "sent a very clear signal. In their (very influential) opinion, it is safe to build systems that scan users' phones for prohibited content," Matthew Green, a security researcher at Johns Hopkins University, warned.

"This will break the dam — governments will demand it from everyone."

Other privacy researchers such as India McKinney and Erica Portnoy of the Electronic Frontier Foundation wrote in a blog post that it may be impossible for outside researchers to double check whether Apple keeps its promises to check only a small set of on-device content.

The move is "a shocking about-face for users who have relied on the company's leadership in privacy and security," the pair wrote.

"At the end of the day, even a thoroughly documented, carefully thought-out, and narrowly-scoped backdoor is still a backdoor," McKinney and Portnoy wrote.


Is OnePlus cannibalising itself with the Nord 2 5G? We discussed this and more on Orbital, the Gadgets 360 podcast. Orbital is available on Apple Podcasts, Google Podcasts, Spotify, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Further reading: Apple, iPhone, iCloud
Advertisement

Related Stories

Popular Mobile Brands
  1. Best Diwali 2025 Wishes, Quotes, and Facebook Statuses to Share
  1. Mysterious Asteroid Impact Found in Australia, But the Crater is Missing
  2. Thanal Comes to OTT: Everything You Need to Know About This Tamil Action Thriller
  3. Madam Sengupta Is Now Streaming: Know Where to Watch This Bangla Crime Thriller
  4. Ryugu Samples Reveal Ancient Water Flow on Asteroid for a Billion Years
  5. Scientists Create Most Detailed Radio Map of Early Universe Using MWA
  6. Mayor of Kingstown Season 4 OTT Release: Know When, Where to Watch Jeremy Renner's Crime Drama
  7. Our Fault Is Streaming Now: Know All About This Gabriel Guevara and Nicole Wallace Starrer
  8. The Conjuring: Last Rites Is Now Streaming Online: Know Where to Watch the Latest Installment from the Horror Franchise
  9. Delhi Crime Season 3 OTT Release: Know When to Watch This Shefali Shah Thriller Series
  10. Vast Space to Launch Haven-1, the World’s First Private Space Station in 2026
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.