In SN1031 there was discussion about Austrian legislation to spy on encrypted communications. Discussion focused on breaking encryption. However, I would claim that ship have sailed since Apple infamous CSAM AI device side scanning. This technology is already out there and can trivially be aimed at anything, precisely at the wanted target or group. Particularly if opaque closed system such as iOS is used. Encrypted content is not encrypted at the two ends... Would be great to hear Steve analyze this new security/privacy frontier. How do we protect ourselves from directed on device spying?
