So the EU is apparently pondering to make a mandatory pedo scanner for software.https://12ft.io/proxy?q=https%3A%2F%2Ftechcrunch.com%2F2022%2F05%2F11%2Feu-csam-detection-plan%2F
Many people have pointed out that this is just a pretext to attack:
and maybe even free open source software.
Many people think it's surveillance organizations them selves that are uploading the CSAM on purpose to push for laws that expand their legal permissions.
And all of the above is undoubtedly true.
Consider that if you invert the assumption of innocence and declare that wanting privacy makes you into a pedo-suspect that means that secret organizations have to be considered pedo-guilty by default, because they can't prove their innocence while keeping their secrets either.
If you argue that effective encryption that can't be broken which is absolutely necessary for the very concept of privacy, has to be undermined for the pedo-scanner. Then that same argument has to be made for proprietary software. Many pieces of proprietary software are in the range of tens or hundreds of gigabytes, and without publicly available source-code it's possible to hide a huge assortment of pedo-content in there. By contrast it's not possible to hide pedo-stuff in open source software.
Effective unbreakable encryption is not only necessary for privacy but also essential for IT security because without cryptographic signatures it's impossible to verify whether or not software hasn't been compromised.
But one glaringly obvious thing that is overlooked in this debate, is how a CSAM scanner works.
Every possible method of scanning for CSAM requires building a giant database filled with pedo-content.
There are relatively simple methods that use the pedo-data-base to create pedo-signatures of files, and there are more sophisticated methods, like using it to train machine learning algorithms to detect the pedo-patterns.
I can't help but think that a bunch of pedophiles got together and said <"how can we create a pedo-pornhub without the rest of society trying to burn us at the stake for eating their children"
and<"how do we get new pedo-content for the pedo-pornhub"
Because what they are doing is violating privacy and compromising the IT Security of computers used by children and scan it for potential "content" that has pedo-characteristics, that can than be uploaded to their pedo-data-base.
Basically the pedo-mafia has made an alliance with the surveillance-mafia.
But this isn't just about them creating a pedo-pornhub, they will indubitably find actual pedophiles with this, and then will be able to blackmail them to either go to prison or join the pedo-surveilance mafia. So it's also a recruitment tool for their crime-organization.
The Apple corporation which was the first that has implement the pedo-scanner-collection-tools and pedo-data-base might be the epi-center of this massive pedo-spiracy.
Before you dismiss this as schizo-ramblings, consider the following:
Since the assumption of innocence is being inverted, we have to consider that those people who are lobbying to create a giant data-base filled with pedo-content and legalized mechanisms to basically scan and scrape every computer for new content, that this is in fact a great pedo-conspiracy until they can prove their innocence. And that everybody who doesn't agree with my accusations is a suspected pedo-co-conspirator until proven innocent.
short talking points in case a wall of text won't do:
Attempting to weaken/undermine privacy/encryption = pedo-creepers that want to spy on kids
Attempting to attack free and open source software = furthering the goal of hiding csam in proprietary-pedo-ware
Appearing to combat pedo-philes would be the best predator-disguise for a pedophile.