This is continuation of my previous blog covering the R.4(2) of new IT guidelines, which also included the Apple’s dilemma of creating back door for unlocking the iPhone in San Bernardino case for National Security. The current blog is related to the scanning of User’s Data for identification of CSAM (Child Sexual Abuse Material) content, but, at the Client’s Side. And would this Apple’s feature negate its long standing repute of adhering to User’s Privacy, come what may? I’ll elucidate this point by point.