They’re not the images of your gf, they are hashes. It basically takes elements from a photo, metadata, raw data and checks them against a db of hashes from known CSAM.
In any case, the biggest issue is the potential for misuse because it all leverages on governments and most don’t have their citizens backs.
It’s basically building a back door into a corner of your system and handing the keys to every government agency, regardless of how authoritarian they are. It will start off with noble intentions but quickly devolve into a shitshow of civil rights violations.
They’re not the images of your gf, they are hashes. It basically takes elements from a photo, metadata, raw data and checks them against a db of hashes from known CSAM.
In any case, the biggest issue is the potential for misuse because it all leverages on governments and most don’t have their citizens backs.
It’s basically building a back door into a corner of your system and handing the keys to every government agency, regardless of how authoritarian they are. It will start off with noble intentions but quickly devolve into a shitshow of civil rights violations.