Re: Approaching the IETF - A View from Civil Society

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> On Aug 2, 2023, at 10:11 PM, Keith Moore <moore@xxxxxxxxxxxxxxxxxxxx> wrote:
> 
> On 8/2/23 22:03, John Curran wrote:
> 
>> Now one can argue that real world security analogies don’t apply, because in the real world there is often the prosecution of culprits – unlike occurs with those caught in spam filters – but I would note that there is rather significant prosecution efforts (and successes) today against CSAM production and distribution, so that comparison to spam detection really doesn’t hold up – even modestly functional measures that mitigate a small additional fraction of the activity would make a real very difference to those who don’t have to suffer the harms of trafficking & production.
> 
> The specific point I made is that if there's some oracle used to decide whether a message is CSAM, that is accessible to an app, then the same oracle can be used to test whether some altered version of a CSAM image, or for that matter a synthetic image, passes the oracle.   This by itself helps CSAM producers generate images that will evade CSAM detectors.

Keith - 

Sure - but that doesn’t mean that deployment of such solutions will likely result in an _increase_ in CSAM production (not unless you assume that existing enforcement efforts will all automatically become dependent on such solutions and/or otherwise become moribund.) 

> (The analogy to spam filters is if the spammers can test their messages against spam filters that are in use, they can easily generate spam that reliably evades such filters.   Prosecution has nothing to do with it.)
> 
> The general point is simply this: it's not unusual for a naive solution to make a problem worse.   It's easy to have misplaced faith in a newly proposed solution.  It's not hard to find examples of this in past IETF work.

Certainly a possibility, but by no means assured and thus hard to support a “likely” conclusion that the “effect of any CSAM countermeasure is to increase the distribution and production of CSAM, and with it the number of victims.”

DRM is a fine example - it’s imperfect, there’s a continual escalation of technologies on both defense and attack spheres, and yet it’s deemed sufficiently effective by many parties and in many contexts  (despite known imperfections) to enjoy widespread use. 

It may not be what technologists want, but technologists aren’t the only party at the table – when new solutions to such problems are considered, the IETF needs to decide if it wishes to participate and architect the most technically sound, effective and least intrusive solution possible, or proclaim such work outside it’s scope and/or existing dogma.   There are tradeoffs with either route (and to the resulting role/direction of IETF), so the process by which the IETF considers such questions may be fairly important. 

Thanks,
/John

p.s. disclaimers: my views alone – past performance may not be an indicator of future results. 






[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux