AI and global governance: modalities, rationales, tensions

M Veale, K Matus, R Gorwa - Annual Review of Law and Social …, 2023 - annualreviews.org
Artificial intelligence (AI) is a salient but polarizing issue of recent times. Actors around the
world are engaged in building a governance regime around it. What exactly the “it” is that is …

Are iphones really better for privacy? comparative study of ios and android apps

K Kollnig, A Shuba, R Binns, M Van Kleek… - arxiv preprint arxiv …, 2021 - arxiv.org
While many studies have looked at privacy properties of the Android and Google Play app
ecosystem, comparatively much less is known about iOS and the Apple App Store, the most …

Learning to break deep perceptual hashing: The use case neuralhash

L Struppek, D Hintersdorf, D Neider… - Proceedings of the 2022 …, 2022 - dl.acm.org
Apple recently revealed its deep perceptual hashing system NeuralHash to detect child
sexual abuse material (CSAM) on user devices before files are uploaded to its iCloud …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arxiv preprint arxiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

Deep perceptual hashing algorithms with hidden dual purpose: when client-side scanning does facial recognition

S Jain, AM Creţu, A Cully… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
End-to-end encryption (E2EE) provides strong technical protections to individuals from
interferences. Governments and law enforcement agencies around the world have however …

The role of cybersecurity in medical devices regulation: Future considerations and solutions

KR Ludvigsen - Law, Tech. & Hum., 2023 - HeinOnline
Medical devices are becoming increasingly more sophisticated in a variety of ways. This
includes having increasingly complex digital functionalities assisted by software systems. 2 …

Public verification for private hash matching

S Scheffler, A Kulshrestha… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
End-to-end encryption (E2EE) prevents online services from accessing user content. This
important security property is also an obstacle for content moderation methods that involve …

Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use and Tax Evasion in Germany

L Geierhaas, F Otto, M Häring… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
In recent years, there have been a rising number of legislative efforts and proposed
technical measures to weaken privacy-preserving technology, with the stated goal of …

SoK: Web Authentication in the Age of End-to-End Encryption

J Blessing, D Hugenroth, RJ Anderson… - arxiv preprint arxiv …, 2024 - arxiv.org
The advent of end-to-end encrypted (E2EE) messaging and backup services has brought
new challenges for usable authentication. Compared to regular web services, the nature of …

Black-box collision attacks on the neuralhash perceptual hash function

D Leblanc-Albarel, B Preneel - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Perceptual hash functions map multimedia content that is perceptually close to outputs
strings that are identical or similar. They are widely used for the identification of protected …