News /

Apple's NeuralHash Reverse Engineered By Developer

A developer claims to have reversed engineered Apple’s NeuralHash algorithm used in their new Child Sexual Abuse Material (CSAM) detection technology.

According to Apple, “CSAM Detection enables Apple to accurately identify and report iCloud users who store known Child Sexual Abuse Material (CSAM) in their iCloud Photos accounts. Apple servers flag accounts exceeding a threshold number of images that match a known database of CSAM image hashes so that Apple can provide relevant information to the National Center for Missing and Exploited Children (NCMEC). This process is secure, and is expressly designed to preserve user privacy.”

The developer who reversed engineered NeuralHash into Python code, Asuhariet Ygvar, claims it “already exists” in iOS 14.3 under obfuscated class names. Ygvar published the code to GitHub, allowing the code to be tested by anyone regardless of if they use an Apple device.

“If NeuralHash finds 30 or more matching hashes, the images are flagged to Apple for a manual review before the account owner is reported to law enforcement,” TechCrunch reported. “Apple says the chance of a false positive is about one in one trillion accounts.”

However, quickly after publishing the code, Cory Cornelius, a research scientist at Intel Labs, reported the first case of a “hash collision,” which in the case of this algorithm means that two completely different pictures produced the same hash and resulted in a false positive.

Kenneth White, a security researcher and founder of the Open Crypto Audit Project, said in a tweet: “I think some people aren’t grasping that the time between the iOS NeuralHash code being found and [the] first collision was not months or days, but a *couple of hours.*”

Some security researchers warn that knowing the algorithm will allow for people to cause false positives, causing users to be flagged for innocent images, and false negatives, images that won’t be detected despite being in the CSAM database.

TechCrunch attempted to contact Apple about the situation, but they said an Apple spokesperson “declined to comment on the record.”

“But in a background call where reporters were not allowed to quote executives directly or by name, Apple downplayed the hash collision and argued that the protections it puts in place — such as a manual review of photos before they are reported to law enforcement — are designed to prevent abuses,” TechCrunch reported. “Apple also said that the version of NeuralHash that was reverse-engineered is a generic version, and not the complete version that will roll out later this year.”

*For corrections please email [email protected]*

7 responses to “Apple’s NeuralHash Reverse Engineered By Developer”

  1. Genova says:

    lets call it what it is, a way to ease up the pulling up of the goal post on privacy invasion disguised as saving children. NO ONE will say no to that. pay attention how this unfolds over the years, today, they are scanning for CP, tomorrow you are getting banned for things the far left silicon valley do not agree with. this will surely get abused and used for targeting people they dont like.

  2. Sliceyy says:

    Hunter’s a fuckin legend 👀

  3. UppityG says:

    So glad I’ve never owned an Apple phone. Our Big Brother Big Tech oligarchs are more than happy to poke holes in the 1st Amend for the govt. when Their Guy is POTUS.

    Are we having fun yet?

  4. UppityG says:

    PhoneS. He used more than one at the same time to record his sexual stupidity. I know, I watched the first video made public of him getting his wank foot massaged, and I’ll never get back those five minutes of my life.

    So long as his dad is the guy the corrupt corporate media and the corrupt powers that be favors, he’s safe.

    Yeah, I’m proud to be American but I’m not proud of our leadership.

  5. Etan-Ra says:

    wait so there is group of people whos only job will be to look at kiddie porn all day. What kind of sick fuck volunteers for that . In a world where no one wants to work do you think it will be hard to find applicants for this debauchery.

  6. VannicWolf says:

    bet they ignore Hunters phone.

  7. kriytz says:

    yo- how many did they test before the beagle and not_beagle spat out identical hashes? can you at least *attempt* to put a number or range on that? thanks