{"id":9971,"date":"2021-09-02T13:41:57","date_gmt":"2021-09-02T10:41:57","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9971"},"modified":"2021-09-30T18:53:03","modified_gmt":"2021-09-30T15:53:03","slug":"what-is-apple-csam-detection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-apple-csam-detection\/9971\/","title":{"rendered":"Apple&#8217;\u0131n kullan\u0131c\u0131lar\u0131 nas\u0131l izlemeyi planl\u0131yor?"},"content":{"rendered":"<p>2021 A\u011fustos ba\u015f\u0131nda Apple, \u00e7ocuk istismar\u0131 g\u00f6r\u00fcnt\u00fcleri i\u00e7eren foto\u011fraflar\u0131 tan\u0131mlamaya ili\u015fkin geli\u015ftirdi\u011fi <a href=\"https:\/\/www.theverge.com\/2021\/8\/5\/22611721\/apple-csam-child-abuse-scanning-hash-system-ncmec\" target=\"_blank\" rel=\"noopener nofollow\">yeni sistemini tan\u0131tt\u0131<\/a>. Apple\u2019\u0131n \u00e7ocuk pornografisinin yay\u0131lmas\u0131yla m\u00fccadele etmesi tart\u0131\u015fmas\u0131z iyi niyetli bir ama\u00e7 gibi g\u00f6r\u00fcnse de, yap\u0131lan duyuru sonras\u0131 \u015firket ele\u015ftirilerin hedefi haline geldi.<\/p>\n<p>Apple, kullan\u0131c\u0131lar\u0131n g\u00f6z\u00fcnde uzun s\u00fcredir kullan\u0131c\u0131 gizlili\u011fine \u00f6nem veren bir cihaz \u00fcreticisi imaj\u0131 olu\u015fturmu\u015ftu. iOS 15 ve iPadOS 15 i\u00e7in \u00e7\u0131kmas\u0131 beklenen yeni \u00f6zellikler \u015fimdiden bu imaja ciddi bir darbe vursa da \u015firket bu konuda geri ad\u0131m atm\u0131yor. \u0130\u015fte ya\u015fananlar ve bunlar\u0131n s\u0131radan iPhone ve iPad kullan\u0131c\u0131lar\u0131 \u00fczerindeki etkileri.<\/p>\n<h2>CSAM Tespit Sistemi nedir?<\/h2>\n<p>Apple\u2019\u0131n planlar\u0131na ili\u015fkin taslak, \u015firketin <a href=\"https:\/\/www.apple.com\/child-safety\/\" target=\"_blank\" rel=\"noopener nofollow\">internet sitesinde<\/a> yer al\u0131yor. \u015eirket, CSAM olarak da bilinen \u201c\u00e7ocuklara y\u00f6nelik cinsel istismar i\u00e7eri\u011fi\u201d (child sexual abuse material) i\u00e7in kullan\u0131c\u0131lar\u0131n cihazlar\u0131n\u0131 tarayan CSAM Tespit adl\u0131 bir sistem geli\u015ftirdi.<\/p>\n<p>CSAM, \u201c\u00e7ocuk pornografisi\u201d anlam\u0131na gelse de, Amerika Birle\u015fik Devletleri\u2019nde kay\u0131p ve istismar edilen \u00e7ocuklar\u0131n bulunmas\u0131na ve kurtar\u0131lmas\u0131na yard\u0131mc\u0131 olan Ulusal Kay\u0131p ve \u0130stismara U\u011fram\u0131\u015f \u00c7ocuklar Merkezi (<a href=\"https:\/\/www.missingkids.org\/HOME\" target=\"_blank\" rel=\"noopener nofollow\">NCMEC<\/a>), \u201cCSAM\u201d\u0131 kullan\u0131lmas\u0131 daha uygun bir terim olarak kabul ediyor. NCMEC, Apple ve di\u011fer teknoloji firmalar\u0131na bilinen CSAM g\u00f6r\u00fcnt\u00fcleri hakk\u0131nda bilgi sa\u011fl\u0131yor.<\/p>\n<p>Apple, mobil cihazlar\u0131nda ebeveyn denetimlerinin kapsam\u0131n\u0131 geni\u015fleten di\u011fer baz\u0131 \u00f6zelliklerle birlikte, \u00f6rne\u011fin birisinin, \u00e7ocuklar\u0131na Apple\u2019\u0131n Mesajlar uygulamas\u0131 \u00fczerinden m\u00fcstehcen bir foto\u011fraf g\u00f6ndermesi halinde ebeveynlerin bildirim almas\u0131n\u0131 sa\u011flayan CSAM Tespit \u00f6zelli\u011fini de kullan\u0131ma sundu.<\/p>\n<p>Birka\u00e7 teknolojinin ayn\u0131 anda sunulmas\u0131 kar\u0131\u015f\u0131kl\u0131\u011fa yol a\u00e7t\u0131 ve bir\u00e7ok insan, Apple\u2019\u0131n art\u0131k s\u00fcrekli olarak t\u00fcm kullan\u0131c\u0131lar\u0131 izleyece\u011fi hissine kap\u0131ld\u0131. Ancak durum b\u00f6yle de\u011fil.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\"><\/strong><\/p>\n<h2>CSAM Tespit sisteminin kullan\u0131ma sunulmas\u0131na ili\u015fkin takvim<\/h2>\n<p>CSAM Tespit sistemi, bu sonbaharda mevcut t\u00fcm iPhone ve iPad (iPhone 6S, be\u015finci nesil iPad ve sonras\u0131) kullan\u0131c\u0131lar\u0131na sunulacak olan iOS 15 ve iPadOS 15 mobil i\u015fletim sistemlerinin bir par\u00e7as\u0131 olacak. Sistem teorik olarak d\u00fcnyadaki t\u00fcm Apple mobil cihazlar\u0131nda yer alacak olsa da, \u015fimdilik sadece Amerika Birle\u015fik Devletleri\u2019nde tam fonksiyonel \u015fekilde \u00e7al\u0131\u015facak.<\/p>\n<h2>CSAM Tespit sistemi nas\u0131l \u00e7al\u0131\u015f\u0131yor?<\/h2>\n<p>CSAM Tespit sistemi yaln\u0131zca, ak\u0131ll\u0131 telefon veya tabletten Apple sunucular\u0131na foto\u011fraf y\u00fckleyen ve bunlar\u0131 kullan\u0131c\u0131n\u0131n di\u011fer cihazlar\u0131nda eri\u015filebilir hale getiren iCloud hizmetinin bir par\u00e7as\u0131 olan iCloud Foto\u011fraflar uygulamas\u0131 ile birlikte \u00e7al\u0131\u015f\u0131yor. .<\/p>\n<p>Bir kullan\u0131c\u0131n\u0131n cihaz ayarlar\u0131ndan foto\u011fraf senkronizasyonunu devre d\u0131\u015f\u0131 b\u0131rakmas\u0131 halinde, CSAM Tespit sistemi de devre d\u0131\u015f\u0131 kal\u0131yor. Peki bu, yaln\u0131zca buluttaki foto\u011fraflar\u0131n kriminal veri tabanlar\u0131ndakilerle kar\u015f\u0131la\u015ft\u0131r\u0131laca\u011f\u0131 anlam\u0131na m\u0131 geliyor? Tam olarak \u00f6yle de\u011fil. Apple\u2019\u0131n ihtiya\u00e7 duyulan gizlilik d\u00fczeyini sa\u011flamaya \u00e7al\u0131\u015fmas\u0131 nedeniyle sistem, kas\u0131tl\u0131 olarak karma\u015f\u0131k bir yap\u0131ya sahip.<\/p>\n<p>Apple, yapt\u0131\u011f\u0131 a\u00e7\u0131klamada CSAM Tespit sisteminin, NCMEC veya di\u011fer benzer kurulu\u015flar\u0131n veri tabanlar\u0131ndaki foto\u011fraflarla e\u015fle\u015fip e\u015fle\u015fmedi\u011fini belirlemek amac\u0131yla cihazdaki foto\u011fraflar\u0131 tarad\u0131\u011f\u0131n\u0131 <a href=\"https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf\" target=\"_blank\" rel=\"noopener nofollow\">belirtiyor<\/a>.<\/p>\n<div id=\"attachment_9975\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9975\" class=\"wp-image-9975 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/09\/02132333\/what-is-apple-csam-detection-1-1024x520.png\" alt=\"\" width=\"1024\" height=\"520\"><p id=\"caption-attachment-9975\" class=\"wp-caption-text\">CSAM Tespit sisteminin \u00e7al\u0131\u015fma \u015fekline ili\u015fkin basitle\u015ftirilmi\u015f \u015fema. <a href=\"https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a><\/p><\/div>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Tespit y\u00f6ntemi temel olarak, i\u00e7eriklerine g\u00f6re foto\u011fraflar i\u00e7in dijital tan\u0131mlay\u0131c\u0131lar veya hesaba dayal\u0131 adreslemeler olu\u015fturan NeuralHash teknolojisini kullan\u0131yor. Bir hesaba dayal\u0131 adresleme, veri taban\u0131ndaki \u00e7ocuk istismar\u0131 g\u00f6r\u00fcnt\u00fclerinden biriyle e\u015fle\u015firse, g\u00f6r\u00fcnt\u00fc ve hesaba dayal\u0131 adresleme Apple\u2019\u0131n sunucular\u0131na y\u00fckleniyor. Apple, g\u00f6r\u00fcnt\u00fcy\u00fc resmi olarak kaydetmeden \u00f6nce ba\u015fka bir kontrol daha ger\u00e7ekle\u015ftiriyor.<\/p>\n<p>Sistemin di\u011fer bir bile\u015feni olan<em> \u00f6zel k\u00fcme kesi\u015fimi<\/em> (private set intersection) ad\u0131 verilen \u015fifreleme teknolojisi, CSAM Tespit sistemi taramas\u0131n\u0131n sonu\u00e7lar\u0131n\u0131 \u015fifreliyor ve bu \u015fifrelemeyi Apple, yaln\u0131zca bir dizi kriterin kar\u015f\u0131lanmas\u0131 halinde \u00e7\u00f6zebiliyor. Teorik olarak bunun, sistemin k\u00f6t\u00fcye kullan\u0131lmas\u0131n\u0131 \u2014 yani, bir \u015firket \u00e7al\u0131\u015fan\u0131n\u0131n sistemi k\u00f6t\u00fcye kullanmas\u0131n\u0131 veya devlet kurumlar\u0131n\u0131n talebi \u00fczerine g\u00f6r\u00fcnt\u00fclerin teslim edilmesini \u2014 \u00f6nlemesi gerekiyor.<\/p>\n<p>Apple\u2019\u0131n yaz\u0131l\u0131m m\u00fchendisli\u011fi k\u0131demli ba\u015fkan yard\u0131mc\u0131s\u0131 Craig Federighi, 13 A\u011fustos\u2019ta <em>Wall Street Journal<\/em> ile yapt\u0131\u011f\u0131 r\u00f6portajda, \u00f6zel k\u00fcme kesi\u015fim protokol\u00fcn\u00fcn ana koruma mekanizmas\u0131na ili\u015fkin <a href=\"https:\/\/www.wsj.com\/articles\/apple-executive-defends-tools-to-fight-child-porn-acknowledges-privacy-backlash-11628859600\" target=\"_blank\" rel=\"noopener nofollow\">a\u00e7\u0131klamalarda bulundu<\/a>. Buna g\u00f6re Apple\u2019a bir uyar\u0131 gelmesi i\u00e7in 30 foto\u011fraf\u0131n NCMEC veri taban\u0131ndaki g\u00f6r\u00fcnt\u00fclerle e\u015fle\u015fmesi gerekiyor. A\u015fa\u011f\u0131daki \u015feman\u0131n da g\u00f6sterdi\u011fi \u00fczere \u00f6zel k\u00fcme kesi\u015fim sistemi, bu e\u015fi\u011fe ula\u015f\u0131lana kadar veri k\u00fcmesinin (CSAM Tespit sisteminin \u00e7al\u0131\u015fmas\u0131 ve foto\u011fraflarla ilgili bilgilerin) \u015fifresinin \u00e7\u00f6z\u00fclmesine izin vermiyor. Apple\u2019a g\u00f6re, bir g\u00f6r\u00fcnt\u00fcn\u00fcn i\u015faretlenmesine ili\u015fkin e\u015fik \u00e7ok y\u00fcksek oldu\u011fundan, yanl\u0131\u015f bir e\u015fle\u015fmenin ger\u00e7ekle\u015fme olas\u0131l\u0131\u011f\u0131 trilyonda bir gibi \u00e7ok d\u00fc\u015f\u00fck bir ihtimal.<\/p>\n<div id=\"attachment_9976\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9976\" class=\"wp-image-9976 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/09\/02132942\/what-is-apple-csam-detection-2-1024x629.png\" alt=\"\" width=\"1024\" height=\"629\"><p id=\"caption-attachment-9976\" class=\"wp-caption-text\">CSAM Tespit sisteminin \u00f6nemli bir \u00f6zelli\u011fi: Verilerin \u015fifresini \u00e7\u00f6zmek i\u00e7in \u00e7ok say\u0131da foto\u011fraf\u0131n e\u015fle\u015fmesi gerekiyor. <a href=\"https:\/\/www.apple.com\/child-safety\/pdf\/CSAM_Detection_Technical_Summary.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a><\/p><\/div>\n<p>\u00a0<\/p>\n<p>Peki sistem bir uyar\u0131 ald\u0131\u011f\u0131nda ne oluyor? Bir Apple \u00e7al\u0131\u015fan\u0131 verileri manuel olarak kontrol ediyor, \u00e7ocuk pornografisine ili\u015fkin i\u00e7eri\u011fin varl\u0131\u011f\u0131n\u0131 do\u011fruluyor ve yetkilileri bilgilendiriyor. \u015eimdilik sistem sadece Amerika Birle\u015fik Devletleri\u2019nde tam fonksiyonel \u015fekilde \u00e7al\u0131\u015facak, bu nedenle bildirim, ABD Adalet Bakanl\u0131\u011f\u0131 taraf\u0131ndan desteklenen NCMEC\u2019e yap\u0131lacak.<\/p>\n<h2>CSAM Tespit sistemine ili\u015fkin sorunlar<\/h2>\n<p>Apple\u2019\u0131n eylemlerine y\u00f6nelik ele\u015ftiriler iki kategoriye ayr\u0131l\u0131yor: \u015eirketin yakla\u015f\u0131m\u0131n\u0131n sorgulanmas\u0131 ve protokol\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n irdelenmesi. \u015eu an \u00e7ok say\u0131da genel \u015fikayet olmas\u0131na ra\u011fmen, Apple\u2019\u0131n teknik bir hata yapt\u0131\u011f\u0131na dair \u00e7ok az somut kan\u0131t bulunuyor (bu konuyu a\u015fa\u011f\u0131da daha ayr\u0131nt\u0131l\u0131 olarak ele alaca\u011f\u0131z).<\/p>\n<p>\u00d6rne\u011fin, Electronic Frontier Foundation (EFF) s\u00f6z konusu sorunlar\u0131 \u00e7ok ayr\u0131nt\u0131l\u0131 \u015fekilde <a href=\"https:\/\/www.eff.org\/deeplinks\/2021\/08\/if-you-build-it-they-will-come-apple-has-opened-backdoor-increased-surveillance\" target=\"_blank\" rel=\"noopener nofollow\">ifade ediyor<\/a>. EFF\u2019ye g\u00f6re Apple, kullan\u0131c\u0131 taraf\u0131na g\u00f6r\u00fcnt\u00fc taramas\u0131 ekleyerek asl\u0131nda kullan\u0131c\u0131lar\u0131n cihazlar\u0131na bir arka kap\u0131 yerle\u015ftiriyor. Ayr\u0131ca EFF, s\u00f6z konusu konsepte y\u00f6nelik <a href=\"https:\/\/www.eff.org\/deeplinks\/2019\/11\/why-adding-client-side-scanning-breaks-end-end-encryption\" target=\"_blank\" rel=\"noopener nofollow\">ele\u015ftirilerini<\/a> 2019\u2019dan beri dile getiriyor.<\/p>\n<p>Peki bu neden k\u00f6t\u00fc bir \u015fey? \u015eimdi, verilerin tamamen \u015fifrelendi\u011fi (Apple\u2019\u0131n iddia etti\u011fi gibi) bir cihaza sahip oldu\u011funuzu ve ard\u0131ndan bu cihaz\u0131n verilerinizin i\u00e7eri\u011fi hakk\u0131nda ba\u015fkalar\u0131na raporlama yapmaya ba\u015flad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcn. \u015eu an hedef \u00e7ocuk pornografisi, ki bu da \u201cYanl\u0131\u015f bir \u015fey yapm\u0131yorsan\u0131z endi\u015felenecek bir \u015fey de yoktur\u201d gibi s\u0131k\u00e7a tekrarlanan ortak bir s\u00f6yleme yol a\u00e7\u0131yor, ancak b\u00f6yle bir mekanizma oldu\u011fu s\u00fcrece, bunun di\u011fer i\u00e7erikler i\u00e7in uygulanmayaca\u011f\u0131n\u0131 bilebilmemiz m\u00fcmk\u00fcn de\u011fil.<\/p>\n<p>Sonu\u00e7 olarak, bu ele\u015ftiri teknolojik a\u00e7\u0131dan y\u00f6neltilen bir ele\u015ftiriden \u00e7ok politik bir ele\u015ftiridir. Sorunun nedeni, g\u00fcvenlik ile mahremiyet aras\u0131ndaki dengeyi sa\u011flayacak sosyal bir s\u00f6zle\u015fmenin olmamas\u0131. B\u00fcrokratlardan cihaz \u00fcreticilerine, yaz\u0131l\u0131m geli\u015ftiricilerinden insan haklar\u0131 aktivistlerine ve s\u0131radan kullan\u0131c\u0131lara kadar hepimiz, \u015fu an kurulacak bu dengeyi tan\u0131mlamaya \u00e7al\u0131\u015f\u0131yoruz.<\/p>\n<p>Kolluk kuvvetleri, geni\u015f kapsaml\u0131 \u015fifrelemenin kan\u0131t toplamay\u0131 ve su\u00e7lular\u0131 yakalamay\u0131 zorla\u015ft\u0131rd\u0131\u011f\u0131ndan \u015fikayet ediyor ve bu anla\u015f\u0131labilir bir durum. Kitlesel dijital g\u00f6zetim konusunda duyulan endi\u015feler de ortada. Apple\u2019\u0131n politikalar\u0131 ve eylemleri hakk\u0131ndaki g\u00f6r\u00fc\u015fler de dahil olmak \u00fczere dile getirilen bir \u00e7ok g\u00f6r\u00fc\u015f s\u00f6z konusu.<\/p>\n<h2>CSAM Tespit sisteminin uygulanmas\u0131yla ilgili olas\u0131 sorunlar<\/h2>\n<p>Etik kayg\u0131lar\u0131 a\u015ft\u0131\u011f\u0131m\u0131zda, kar\u015f\u0131m\u0131za teknolojinin engebeli yollar\u0131 \u00e7\u0131kar. Herhangi bir programa ait kod, beraberinde yeni g\u00fcvenlik a\u00e7\u0131klar\u0131 getirir. H\u00fck\u00fcmetlerin bu konuda yapabileceklerini bir kenara b\u0131rak\u0131n; ya bir siber su\u00e7lu CSAM Tespit sisteminin g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131rsa? S\u00f6z konusu veri \u015fifreleme oldu\u011funda, bu gayet do\u011fal ve yerinde bir endi\u015fedir: Yaln\u0131zca iyi niyetle olsa bile bilgi korumas\u0131n\u0131 zay\u0131flat\u0131rsan\u0131z, bu zafiyet herhangi biri taraf\u0131ndan ba\u015fka ama\u00e7lar i\u00e7in kullanabilir.<\/p>\n<p>CSAM Tespit sisteminin koduna ili\u015fkin ba\u011f\u0131ms\u0131z denetim s\u00fcreci yeni ba\u015flad\u0131 ve tamamlanmas\u0131 \u00e7ok uzun zaman alabilir. Buna ra\u011fmen halihaz\u0131rda \u00f6\u011frendi\u011fimiz bir ka\u00e7 \u015fey bulunuyor.<\/p>\n<p>\u0130lk olarak, foto\u011fraflar\u0131 bir \u201cmodel\u201d ile kar\u015f\u0131la\u015ft\u0131rmay\u0131 m\u00fcmk\u00fcn k\u0131lan kod, 14.3 s\u00fcr\u00fcm\u00fcnden bu yana iOS\u2019ta (ve macOS\u2019ta) <a href=\"https:\/\/www.macobserver.com\/news\/neural-hash-extracted\/\" target=\"_blank\" rel=\"noopener nofollow\">mevcut<\/a>. B\u00fcy\u00fck olas\u0131l\u0131kla kod, CSAM Tespit sisteminin de bir par\u00e7as\u0131 olacak. G\u00f6r\u00fcnt\u00fcleri e\u015fle\u015ftirmek amac\u0131yla bir arama algoritmas\u0131n\u0131n kullan\u0131lmas\u0131na y\u00f6nelik denenen <a href=\"https:\/\/github.com\/AsuharietYgvar\/AppleNeuralHash2ONNX\" target=\"_blank\" rel=\"noopener nofollow\">yard\u0131mc\u0131 uygulamalar<\/a> daha \u015fimdiden baz\u0131 <a href=\"https:\/\/github.com\/anishathalye\/neural-hash-collider\" target=\"_blank\" rel=\"noopener nofollow\">\u00e7ak\u0131\u015fmalar\u0131<\/a> ortaya \u00e7\u0131kard\u0131. \u00d6rne\u011fin, Apple\u2019\u0131n NeuralHash algoritmas\u0131na g\u00f6re, a\u015fa\u011f\u0131daki iki g\u00f6r\u00fcnt\u00fc ayn\u0131 hesaba dayal\u0131 adreslemeye sahip:<\/p>\n<div id=\"attachment_9977\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9977\" class=\"wp-image-9977 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/09\/02133212\/what-is-apple-csam-detection-3.png\" alt=\"\" width=\"740\" height=\"360\"><p id=\"caption-attachment-9977\" class=\"wp-caption-text\">Apple\u2019\u0131n NeuralHash algoritmas\u0131na g\u00f6re, bu iki foto\u011fraf birbiriyle e\u015fle\u015fiyor. <a href=\"https:\/\/github.com\/anishathalye\/neural-hash-collider\" target=\"_blank\" rel=\"noopener nofollow\">Kaynak<\/a><\/p><\/div>\n<p>\u00a0<\/p>\n<p>Yasad\u0131\u015f\u0131 foto\u011fraflar\u0131n hesaba dayal\u0131 adreslemelerini veri taban\u0131ndan \u00e7\u0131karmak m\u00fcmk\u00fcnse, \u201cmasum\u201d g\u00f6r\u00fcnt\u00fclerden bir uyar\u0131y\u0131 tetikleyen g\u00f6r\u00fcnt\u00fcler de olu\u015fturmak m\u00fcmk\u00fcnd\u00fcr; bu, Apple\u2019\u0131n CSAM Tespit sistemini s\u00fcrd\u00fcr\u00fclemez hale getirecek kadar hatal\u0131 uyar\u0131 alabilece\u011fi anlam\u0131na geliyor. B\u00fcy\u00fck olas\u0131l\u0131kla Apple\u2019\u0131n algoritman\u0131n bir k\u0131sm\u0131n\u0131 yaln\u0131zca sunucu taraf\u0131nda \u00e7al\u0131\u015ft\u0131rarak tespit sistemini ayr\u0131 tutmas\u0131n\u0131n nedeni budur.<\/p>\n<p>Bunun yan\u0131 s\u0131ra Apple\u2019\u0131n <a href=\"https:\/\/www.apple.com\/child-safety\/pdf\/Apple_PSI_System_Security_Protocol_and_Analysis.pdf\" target=\"_blank\" rel=\"noopener nofollow\">\u00f6zel k\u00fcme kesi\u015fim<\/a> (private set intersection \u2013 PSI) protokol\u00fcne ili\u015fkin yap\u0131lan bir <a href=\"https:\/\/pseudorandom.resistant.tech\/obfuscated_apples.html\" target=\"_blank\" rel=\"noopener nofollow\">analiz<\/a> de bulunuyor. Duyulan rahats\u0131zl\u0131\u011f\u0131n temelinde yatan \u015fey asl\u0131nda, PSI sisteminin hen\u00fcz uyar\u0131 e\u015fi\u011fine ula\u015f\u0131lmasa dahi Apple\u2019\u0131n sunucular\u0131na olduk\u00e7a fazla bilgi aktarmas\u0131. Makale, kolluk kuvvetlerinin Apple\u2019dan verileri talep etti\u011fi bir senaryoyu ele al\u0131yor ve yanl\u0131\u015f uyar\u0131lar\u0131n bile polisin resmi incelemesine yol a\u00e7abilece\u011fini \u00f6ne s\u00fcr\u00fcyor.<\/p>\n<p>\u015eimdilik, yukar\u0131da bahsedilenler yaln\u0131zca, CSAM Tespit sistemine ili\u015fkin yap\u0131lan harici incelemelere ait ilk testler. Testlerin ba\u015far\u0131s\u0131 b\u00fcy\u00fck \u00f6l\u00e7\u00fcde, CSAM Tespit sistemine y\u00f6nelik y\u00fcr\u00fctt\u00fc\u011f\u00fc \u00e7al\u0131\u015fmalar \u2014 ve \u00f6zellikle kaynak kodu \u2014 hakk\u0131nda gizlili\u011fiyle \u00fcnl\u00fc \u015firketin sundu\u011fu \u015feffafl\u0131\u011fa ba\u011fl\u0131.<\/p>\n<h2>Ortalama bir kullan\u0131c\u0131 i\u00e7in CSAM Tespit sistemi ne anlama geliyor?<\/h2>\n<p>Modern cihazlar o kadar karma\u015f\u0131kt\u0131r ki, ger\u00e7ekte ne kadar g\u00fcvenli olduklar\u0131n\u0131, yani \u00fcreticinin s\u00f6z verdi\u011fi g\u00fcvenli\u011fi ne \u00f6l\u00e7\u00fcde sundu\u011funu belirlemek kolay de\u011fildir. \u00c7o\u011fumuzun yapabilece\u011fi tek \u015fey, \u015firketin itibar\u0131na g\u00f6re ona g\u00fcvenmek veya g\u00fcvenmemek.<\/p>\n<p>Ancak \u015fu kilit noktay\u0131 hat\u0131rlamak \u00f6nemlidir: CSAM Tespit sistemi, yaln\u0131zca kullan\u0131c\u0131lar foto\u011fraflar\u0131 iCloud\u2019a y\u00fckledi\u011finde \u00e7al\u0131\u015f\u0131yor. Apple\u2019\u0131n bu tercihi kas\u0131tl\u0131 verilmi\u015f bir karard\u0131 ve s\u00f6z konusu teknoloji konusunda baz\u0131 itirazlar\u0131n gelmesini bekliyordu. Foto\u011fraflar\u0131 buluta y\u00fcklemedi\u011finiz s\u00fcrece hi\u00e7bir yere hi\u00e7bir \u015fey g\u00f6nderilmiyor.<\/p>\n<p>2016\u2019da FBI\u2019\u0131n, San Bernardino, California\u2019da katliam ger\u00e7ekle\u015ftiren bir ki\u015fiye ait iPhone 5C\u2019nin kilidini a\u00e7mak i\u00e7in Apple\u2019dan yard\u0131m istedi\u011finde aralar\u0131nda ya\u015fanan \u00fcnl\u00fc <a href=\"https:\/\/en.wikipedia.org\/wiki\/2015_San_Bernardino_attack\" target=\"_blank\" rel=\"noopener nofollow\">anla\u015fmazl\u0131\u011f\u0131<\/a> hat\u0131rl\u0131yor olabilirsiniz. FBI, Apple\u2019dan telefonun parola korumas\u0131n\u0131 a\u015fmas\u0131n\u0131 sa\u011flayacak bir yaz\u0131l\u0131m yazmas\u0131n\u0131 istedi.<\/p>\n<p>\u015eirket, bunu yapman\u0131n yaln\u0131zca sald\u0131rgan\u0131n telefonunun de\u011fil, ayn\u0131 zamanda herhangi birine ait telefonunun da kilidinin a\u00e7\u0131lmas\u0131n\u0131 sa\u011flayaca\u011f\u0131n\u0131n fark\u0131ndayd\u0131 ve bu teklifi reddetti. FBI geri ad\u0131m att\u0131 ve d\u0131\u015far\u0131dan ald\u0131\u011f\u0131 yard\u0131m ile <a href=\"https:\/\/www.washingtonpost.com\/technology\/2021\/04\/14\/azimuth-san-bernardino-apple-iphone-fbi\/\" target=\"_blank\" rel=\"noopener nofollow\">yaz\u0131l\u0131m\u0131n a\u00e7\u0131klar\u0131ndan yararlanarak<\/a> cihaz\u0131 hackledi ve Apple, m\u00fc\u015fterilerinin haklar\u0131 i\u00e7in sava\u015fan bir \u015firket olarak itibar\u0131n\u0131 s\u00fcrd\u00fcrd\u00fc.<\/p>\n<p>Ancak, hikaye o kadar da basit de\u011fil. Apple, iCloud\u2019daki verilerin bir kopyas\u0131n\u0131 teslim etti. Asl\u0131nda \u015firket, buluta y\u00fcklenen hemen hemen t\u00fcm kullan\u0131c\u0131 verilerine <a href=\"https:\/\/www.reuters.com\/article\/us-apple-fbi-icloud-exclusive-idUSKBN1ZK1CT\" target=\"_blank\" rel=\"noopener nofollow\">eri\u015fim hakk\u0131na sahip<\/a>. <a href=\"https:\/\/support.apple.com\/tr-tr\/HT202303\" target=\"_blank\" rel=\"noopener nofollow\">Anahtar zinciri parolalar\u0131 ve \u00f6deme bilgileri<\/a> gibi baz\u0131 veriler u\u00e7tan uca \u015fifreleme kullan\u0131larak saklansa da \u00e7o\u011fu bilgi yaln\u0131zca &lt;em&gt;<em>izinsiz<\/em>&lt;\/em&gt; eri\u015fimden, yani \u015firketin sunucular\u0131n\u0131n hacklenmesinden korunmak i\u00e7in \u015fifrelenir. Bu da \u015firketin verilerin \u015fifresini \u00e7\u00f6zebilece\u011fi anlam\u0131na gelir.<\/p>\n<p>Yap\u0131lan \u00e7\u0131kar\u0131mlar, CSAM Tespit sistemi hikayesinde belki de en ilgin\u00e7 beklenmedik senaryoyu ortaya \u00e7\u0131kar\u0131yor. Mesela \u015firket, iCloud Foto\u011fraflar uygulamas\u0131ndaki t\u00fcm g\u00f6r\u00fcnt\u00fcleri (Facebook, Google ve di\u011fer bir\u00e7ok bulut hizmeti sa\u011flay\u0131c\u0131s\u0131n\u0131n yapt\u0131\u011f\u0131 gibi) tar\u0131yor olabilir. Apple bunun i\u00e7in, kitlesel kullan\u0131c\u0131 g\u00f6zetimi su\u00e7lamalar\u0131n\u0131 savu\u015fturmas\u0131na yard\u0131mc\u0131 olacak daha zarif bir mekanizma yaratt\u0131 ancak bunun yerine, kullan\u0131c\u0131lar\u0131n cihazlar\u0131n\u0131 taramas\u0131 nedeniyle \u00e7ok daha fazla ele\u015ftirinin hedefi haline geldi.<\/p>\n<p>Sonu\u00e7 olarak kopan bu yaygara ortalama bir kullan\u0131c\u0131 a\u00e7\u0131s\u0131ndan neredeyse hi\u00e7bir \u015feyi de\u011fi\u015ftirmiyor. Verilerinizin korunmas\u0131na konusunda endi\u015feleniyorsan\u0131z, &lt;em&gt;<em>hangisi olursa olsun<\/em>&lt;\/em&gt; kulland\u0131\u011f\u0131n\u0131z bulut hizmetine ele\u015ftirel bir g\u00f6zle bakmal\u0131s\u0131n\u0131z. Yaln\u0131zca cihaz\u0131n\u0131zda saklad\u0131\u011f\u0131n\u0131z veriler g\u00fcvendedir. Apple\u2019\u0131n son eylemleri, sa\u011flam temellere dayanan \u015f\u00fcpheler olu\u015fmas\u0131na neden oldu. \u015eirketin bu y\u00f6nde devam edip etmeyece\u011fi ise hen\u00fcz cevaplanmayan bir soru olarak varl\u0131\u011f\u0131n\u0131 s\u00fcrd\u00fcr\u00fcyor.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple, kullan\u0131c\u0131lar\u0131 izlemek ve cihazlar\u0131nda \u00e7ocuk pornografisi bulunduranlar\u0131 belirlemek i\u00e7in yeni geli\u015ftirdi\u011fi CSAM Tespit Sistemini kullanmay\u0131 planl\u0131yor.<\/p>\n","protected":false},"author":665,"featured_media":9972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[994,995],"tags":[14,500,774,750,100,26,878],"class_list":{"0":"post-9971","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-technology","9":"tag-apple","10":"tag-gizlilik","11":"tag-gozetleme","12":"tag-ios","13":"tag-ipad","14":"tag-iphone","15":"tag-teknoloji"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-is-apple-csam-detection\/9971\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-apple-csam-detection\/23225\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-apple-csam-detection\/18712\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/what-is-apple-csam-detection\/9359\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-apple-csam-detection\/25274\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-apple-csam-detection\/23344\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-is-apple-csam-detection\/22723\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-is-apple-csam-detection\/25890\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-is-apple-csam-detection\/25409\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-is-apple-csam-detection\/31362\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-apple-csam-detection\/41502\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-is-apple-csam-detection\/17541\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-is-apple-csam-detection\/18025\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/what-is-apple-csam-detection\/15203\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-is-apple-csam-detection\/27253\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-is-apple-csam-detection\/31527\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/what-is-apple-csam-detection\/27462\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-is-apple-csam-detection\/24270\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-apple-csam-detection\/29599\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-apple-csam-detection\/29404\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9971"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9971\/revisions"}],"predecessor-version":[{"id":9979,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9971\/revisions\/9979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9972"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}