AppleNeuralHash2ONNX
hardened_malloc
Our great sponsors
AppleNeuralHash2ONNX | hardened_malloc | |
---|---|---|
107 | 652 | |
1,517 | 1,152 | |
- | 2.9% | |
0.0 | 7.9 | |
over 2 years ago | 14 days ago | |
Python | C | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AppleNeuralHash2ONNX
- Legit app in Google Play turns malicious and sends mic recordings every 15 minutes
- Daily General Discussion - October 27, 2022
-
How did apple train its cp filtering algorithm?
Perhaps you're referring to the hash collisions that were generated for the client-side NeuralHash which was reverse engineered about a year ago: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- [Request] A way to remove Apple’s new NeuralHash ( iCloud CSAM scanner )
-
Google AI flags parents' accounts for potential abuse over kid's photos
Except Apple’s hashes have collisions where images that are similar in content but not identical will have the same hash. Meaning their process will have the same result: benign images being flagged as CSAM. See an example here https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- Apple Remains Silent About Plans to Detect Known CSAM Stored in iCloud Photos
-
Apple should scan iPhones for child abuse images, says scanning technology inventor
perceptual hashes are completely broken due to false positives, like making a picture of a dog having the same hash as CSAM images. They are vulnerable to collision and have no preimage resistance, the most important feature. Because of that you can DOS conversations and people by sending dog images with the same hash as a CSAM: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
-
UK cybersecurity chiefs back plan to scan phones for child abuse images | GCHQ | The Guardian
Specifically the fact that you can have one hash on two images, for example. There are other ways to abuse the CSAM system, which is confirmed by several researchers (one, two). And Apple saying it's not a concern... only to pull back on these plans.
- Frage zur drohenden Chatkontrolle
- Apple’s CSAM troubles may be back, as EU plans a law requiring detection
hardened_malloc
- WhatsApp forces Pegasus spyware maker to share its secret code
- EncroChat
-
Popular XMPP App "Conversations" Removed from PlayStore by Google
Relevant copypasta:
Fellow humans, there are alternatives to Google and Apple! Your neck need not be under anyone's boot! You don't even need to give up any functionality:
Data service:
The simplest thing is to buy a prepaid SIM and top it off with cash. The lovely people over at /r/nocontract maintain a big spreadsheet so you can filter by various properties of the available contracts.
Another way to go is to pay for a postpaid plan with a virtual credit card (VCC) like at privacy.com. It won't be linked to your name at the telco, but of course privacy.com knows who you are. There is also Abine Blur, and some others.
Yet a third way to go, which is nascent, is buy an eSIM with crypto. You can also buy prepaid VCCs with crypto.
An interesting new choice is PGPP https://invisv.com/pgpp/ who rotate your IMSI and do some other cool stuff. It works by e-sims.
All these methods make you /pseudo/nymous, but obviously you're still identifiable by subscriber number and possibly IMEI, to put aside correlational things like your traffic profile. You can help this problem by routing everything through a VPN. Then you're pseudonymous but the cell carrier knows nothing about you other than that you use a VPN. Pay for the VPN with crypto. Of course now the VPN provider knows your traffic, but you're much more anonymous to them than you are to a telco. You make your choices. Defense in depth. Etc.
OS:
GrapheneOS: https://grapheneos.org/ Very much like Calyx, but extra-hardened and with no MicroG. No involvement with Google at all by default. You can make a secondary profile in which you install Google Play Services to set up an environment where you can run unprivileged Play services + whatever crapware you need that requires them. Unprivileged here means it's like any other app: if you don't give it access to your location, it won't know where you are. If you end the profile session when you leave, Play Services stops running and stops talking to Google.
CalyxOS: https://calyxos.org/ Privacy-respecting Android distribution that replaces Google spyware with MicroG, so you can have your cake and eat it too. Most everything will work as you're used to, but it does still talk to Google to make that happen.
LineageOS: https://lineageos.org/ The successor to CyanogenMod, will work with many different phones. More privacy and control than stock Android.
There are also many others: Sailfish, Replicant, e
Hardware:
CalyxOS and GrapheneOS run best on Pixels. The path of least resistance is to get one of these phones and run GrapheneOS with Google Services installed in one profile or other.
You could also buy a Librem 5 https://puri.sm/products/librem-5/ If privacy and security and hacking are really important to you.
Or a pinephone: https://www.pine64.org/pinephone/
Neither work very well by regular standards, but they're cool :-)
-
LineageOS is currently installed on 1.5M Android devices
It might be worth to switch to GrapheneOS if you have Pixel phones: https://grapheneos.org/
It is a more serious project than LineageOS in the sense that they take security very seriously and they take their development more professionally too. There are no disadvantages to using GrapheneOS compared to LineageOS.
You can see a comparison here: https://eylenburg.github.io/android_comparison.htm
- Apple Announces Changes to iOS, Safari, and the App Store in the European Union
- No new iPhone? No secure iOS: Looking at an unfixed iOS vulnerability
-
Recommendations for an Android repair shop?
If it still powers up but just won't boot you could try installing https://grapheneos.org/.
-
Iphone Vs Android
On 4thgen Pixels and up you can install GrapheneOS which is a security and privacy focused Android build. It does not come with any Google services pre-installed but you can put them on. https://grapheneos.org/
- Suche Handy empfehlung bis 250€ max.
-
Are you happy
yes... will also de-google it cuz we can install GrapheneOS and also close the bootloader
What are some alternatives?
GmsCore - Free implementation of Play Services
Unihertz-Titan-lineageos-microg - Guide and files required to setup lineageos with microg on the Unihertz Titan
onnxruntime - ONNX Runtime: cross-platform, high performance ML inferencing and training accelerator
ungoogled-chromium - Google Chromium, sans integration with Google
OpenWifiPass - An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.
Magisk - The Magic Mask for Android
ExpansionCards - Reference designs and documentation to create Expansion Cards for the Framework Laptop
Seedvault - A backup application for the Android Open Source Project.
neuralhash-collisions - A catalog of naturally occurring images whose Apple NeuralHash is identical.
plexus - Remove the fear of Android app compatibility on de-Googled devices.
neural-hash-collider - Preimage attack against NeuralHash 💣
mimalloc - mimalloc is a compact general purpose allocator with excellent performance.