Uncategorized

Researchers who built an Apple-like system to identify CSAM in e2e encrypted online services, say they abandoned it due to numerous abuse and misuse concerns (Washington Post)