Olaf Schlüter
1 min readAug 10, 2021

I do not agree with the overall assessment that the new scanning and reporting technique does not change the rules of the game. Scanning data in the cloud is one thing. It hits data in the cloud only and cannot be extended further and fails if those data is protected by let's say encryption. Scanning data on the device is another thing. It possibly hits all data. And there is no protection possible.

The new mechanism is there to support law enforcement. Now, with that new mechanism in place on th device how shall Apple argue if law enforcement asks for other things to do on the device? Like introducing a sniffer into iMessages law enforcement may use to read messages before encryption? There is a high demand by law enforcement all over the world to be able to do this, the so called "free, democratic" world included.

Here in Germany, laws have already been made to allow both law enforcement and intelligence agencies to attack devices abusing unresolved security flaws with the goal to circumvent encryption of communication by reading the cleartext on one end. Asking Apple to deploy a sniffer into iOS to make this possible without abusing zero-day-hacks is a logical demand.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Olaf Schlüter
Olaf Schlüter

Written by Olaf Schlüter

IT security specialist, Physicist by education, believing in God as for the exceptional harmony of the laws of nature to create and support life.

Responses (1)

Write a response

For a sniffer to work, you need to break encryption, and iMessage (not SMS/MMS) still retains encryption. Scanning is done, though it is still a horrible idea, on device prior to encryption,

--