AppleNeuralHash2ONNX
apple-neuralhash-attack
AppleNeuralHash2ONNX | apple-neuralhash-attack | |
---|---|---|
107 | 3 | |
1,517 | 13 | |
- | - | |
0.0 | 0.0 | |
over 2 years ago | over 2 years ago | |
Python | Python | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AppleNeuralHash2ONNX
- Legit app in Google Play turns malicious and sends mic recordings every 15 minutes
- Daily General Discussion - October 27, 2022
-
How did apple train its cp filtering algorithm?
Perhaps you're referring to the hash collisions that were generated for the client-side NeuralHash which was reverse engineered about a year ago: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- [Request] A way to remove Apple’s new NeuralHash ( iCloud CSAM scanner )
-
Google AI flags parents' accounts for potential abuse over kid's photos
Except Apple’s hashes have collisions where images that are similar in content but not identical will have the same hash. Meaning their process will have the same result: benign images being flagged as CSAM. See an example here https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- Apple Remains Silent About Plans to Detect Known CSAM Stored in iCloud Photos
-
Apple should scan iPhones for child abuse images, says scanning technology inventor
perceptual hashes are completely broken due to false positives, like making a picture of a dog having the same hash as CSAM images. They are vulnerable to collision and have no preimage resistance, the most important feature. Because of that you can DOS conversations and people by sending dog images with the same hash as a CSAM: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
-
UK cybersecurity chiefs back plan to scan phones for child abuse images | GCHQ | The Guardian
Specifically the fact that you can have one hash on two images, for example. There are other ways to abuse the CSAM system, which is confirmed by several researchers (one, two). And Apple saying it's not a concern... only to pull back on these plans.
- Frage zur drohenden Chatkontrolle
- Apple’s CSAM troubles may be back, as EU plans a law requiring detection
apple-neuralhash-attack
- Apple iPhone 13 or Google Pixel 6?
- The All-Seeing "i": Apple Just Declared War on Your Privacy
-
[P]roof of concept for Iterative FGSM on Apple NeuralHash
Repo: https://github.com/greentfrapp/apple-neuralhash-attack
What are some alternatives?
GmsCore - Free implementation of Play Services
hardened_malloc - Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
onnxruntime - ONNX Runtime: cross-platform, high performance ML inferencing and training accelerator
OpenWifiPass - An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.
ExpansionCards - Reference designs and documentation to create Expansion Cards for the Framework Laptop
neuralhash-collisions - A catalog of naturally occurring images whose Apple NeuralHash is identical.
neural-hash-collider - Preimage attack against NeuralHash 💣
img-cryptor - Image AES256 crypt-decrypt
nhcalc - Compute NeuralHash for the given image
appleprivacyletter - An open letter against Apple's new privacy-invasive client-side content scanning.
onnxjs - ONNX.js: run ONNX models using JavaScript
neural_hash_collision