Questions on Encryption copied and pasted from another list

9 views
Skip to first unread message

Sivasubramanian Muthusamy

unread,
Jul 8, 2025, 6:41:45 AM7/8/25
to coreinter...@googlegroups.com


Questions 

- who controls the hash lists that every bit of content should be checked against? In your dystopian future, who is "number 1"?
- how is there a safeguard when a contractor performs surveillance, given the recent Apple IPT case?
- how can you guarantee that hash lists are solely used to identify CSAM?
- if your picture ends up in the hash list, have you effectively been erased from the Internet? How can you get your picture removed?
- should hash lists be used for other types of content?
- should it be law that every bit of multimedia content have its own hash?
- if the YouTube algorithm cannot detect copyrighted video content that has had its hue/contrast/aspect ratio/speed/mirroring tampered with, how will a hash list be of any use given it takes a few minutes to re-code a video using trivial free software?

etc.




Dr. Alejandro Pisanty Baruch

unread,
Jul 8, 2025, 3:33:44 PM7/8/25
to coreinter...@googlegroups.com

Guessing that same discussion came up with some answers? Looking forward to your reporting on them in a way conducive to analysis for/under Core Internet Values.


Alejandro Pisanty




De: coreinter...@googlegroups.com <coreinter...@googlegroups.com> en nombre de Sivasubramanian Muthusamy <Inte...@nameshop.in>
Enviado: martes, 8 de julio de 2025 04:41 a. m.
Para: coreinter...@googlegroups.com
Asunto: [CoreInternetValues] Questions on Encryption copied and pasted from another list
 
--
You received this message because you are subscribed to the Google Groups "coreinternetvalues" group.
To unsubscribe from this group and stop receiving emails from it, send an email to coreinternetval...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/coreinternetvalues/CAB%2Bxu1FMTYCbimFkmbinZ8iSGhmao-%3DZQdmJJHmy_7Q8x-i%2B-w%40mail.gmail.com.

Olivier MJ Crépin-Leblond

unread,
Jul 13, 2025, 6:36:14 AM7/13/25
to coreinter...@googlegroups.com, Dr. Alejandro Pisanty Baruch
Dear Alejandro,

these were questions I was going to ask in another session that addressed "Client Side Scanning" but did not have the time to ask as I needed to run to another room whose panel I was on. The topic of client side scanning is not, in my view, within the remit of Core Internet Values. It's a content scanning and encryption problem.
Kindest regards,

Olivier

Christian de Larrinaga

unread,
Jul 13, 2025, 3:51:01 PM7/13/25
to coreinter...@googlegroups.com, Dr. Alejandro Pisanty Baruch, Olivier MJ Crépin-Leblond
I don't know that I can add value to this topic.

 My take on CSS in relation to Internet values is in relation to having  knowable integrity and  positioning of end points in relation to user locations. 

The quality of an end point is critical to integrity of E2E comms.  Or am I missing a point?

C

Olivier MJ Crépin-Leblond

unread,
Jul 13, 2025, 6:00:26 PM7/13/25
to coreinter...@googlegroups.com, Dr. Alejandro Pisanty Baruch
Dear Christian,

good point. A potential threat to End to End. I stand corrected.
Kindest regards,

Olivier
Reply all
Reply to author
Forward
0 new messages