Tomorrow, the EU commission presents the proposal titles laying down rules to prevent and combat child sexual abuse. Today, Politico leaked the official proposal: However, the proposal entails the point to scan every device, such as a smartphone, on the client side to find possible content showing child sexual abuse. A lot of experts and scientists already published in 2021 a paper titled Bugs in our Pockets: The Risks of Client Side Scanning when the topic already was in the news as Apple was elaborating to deploy such a technology. The abstract states the following:

Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, and governments. This has led to pervasive use of cryptography across society. Despite its evident advantages, law enforcement and national security agencies have argued that the spread of cryptography has hindered access to evidence and intelligence. Some in industry and government now advocate a new technology to access targeted data: client-side scanning (CSS). Instead of weakening encryption or providing law enforcement with backdoor keys to decrypt communications, CSS would enable on-device analysis of data in the clear. If targeted information were detected, its existence and, potentially, its source, would be revealed to the agencies; otherwise, little or no information would leave the client device. Its proponents claim that CSS is a solution to the encryption versus public safety debate: it offers privacy – in the sense of unimpeded end-to-end encryption – and the ability to successfully investigate serious crime. In this report, we argue that CSS neither guarantees efficacious crime prevention nor prevents surveillance. Indeed, the effect is the opposite. CSS by its nature creates serious security and privacy risks for all society while the assistance it can provide for law enforcement is at best problematic. There are multiple ways in which client-side scanning can fail, can be evaded, and can be abused.