• 0 Posts
  • 5 Comments
Joined 1 year ago
cake
Cake day: August 2nd, 2023

help-circle

  • Germany has the same problems. After the reunification they merged the east and west state railway companies into a private enterprise, the Deutsche Bahn AG. Since then, the service progressively became worse and the prices unaffordable.

    They engaged in a downward spiral of cutting infrastructure investments and reducing coverage/offer and having less private travellers. Now the infrastructure is such a bad state, that the bad quality of the service is a running gag in Germany. Voyagers now expect their train being late and hope that it will not be cancelled last minute.

    In the last couple of years, there has been a push to invested in the infrastructure, but it’s too little too late and it’s going to take decades to make the train an attractive option again.

    One of the reason why they are still getting by financially, is because the have very good marketing.

    Here’s a good video about it. It’s in German, but you can get the English auto-translation.



  • I have helped a little with some ongoing research on the subject of client-side-scanning in a European research center. Only some low level stuff, but I possess a solid background in IT security and I can explain a little what the proposition made to the EU is. I am by no means condemning what is proposed here.I myself based on what experts have explained am against the whole idea because of the slippery slope it creates for authoritarian government and how easily it can be abused.

    The idea is to use perceptual hashing to create a local or remote database of known abuse material (Basically creating an approximation of already known CP content and hashing it) and then comparing all images accessible to the messaging app against this database by using the same perceptual hashing process on them.

    It’s called Client-Side-Scanning because of the fact that it’s simply circumventing the encryption process. Circumvention in this case means that the process happens outside of the communication protocol, either before or after the images, media, etc, are sent. It does not matter that you use end-to-end encryption if the scanning is happening on you data at rest on your device and not in transit. In this sense it wouldn’t directly have an adverse effect on end-to-end encryption.

    Some of the most obvious issues with this idea, outside of the blatant privacy violation are:

    1. Performance: how big is the database going to get? Do we ever stop including stuff?
    2. Ethical: Who is responsible for including hashes in the database? Once a hash is in there it’s probably impossible to tell what it represent, this can obviously be abused by unscrupulous governments.
    3. Personal: There is heavy social stigma associated with CP and child abuse. Because of how they work, perceptual hashes are going to create false positives. How are these false positives going to be addressed by the authorities? Because when the police come knocking on your door looking for CP, your neighbors might not care or understand that it was a false positive.
    4. False positives: the false positive rate for single hashes is going to stay roughly the same but the bigger the database gets the more false positive there is going to be. This will quickly lead to problems managing false positive.
    5. Authorities: Local Authorities are generally stretcht thin and have limited resources. Who is going to deal with the influx of reports coming from this system?