AppleNeuralHash2ONNX
neural-hash-collider
Our great sponsors
AppleNeuralHash2ONNX | neural-hash-collider | |
---|---|---|
107 | 37 | |
1,517 | 651 | |
- | - | |
0.0 | 1.2 | |
over 2 years ago | about 1 year ago | |
Python | Python | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
AppleNeuralHash2ONNX
- Legit app in Google Play turns malicious and sends mic recordings every 15 minutes
- Daily General Discussion - October 27, 2022
-
How did apple train its cp filtering algorithm?
Perhaps you're referring to the hash collisions that were generated for the client-side NeuralHash which was reverse engineered about a year ago: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- [Request] A way to remove Apple’s new NeuralHash ( iCloud CSAM scanner )
-
Google AI flags parents' accounts for potential abuse over kid's photos
Except Apple’s hashes have collisions where images that are similar in content but not identical will have the same hash. Meaning their process will have the same result: benign images being flagged as CSAM. See an example here https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- Apple Remains Silent About Plans to Detect Known CSAM Stored in iCloud Photos
-
Apple should scan iPhones for child abuse images, says scanning technology inventor
perceptual hashes are completely broken due to false positives, like making a picture of a dog having the same hash as CSAM images. They are vulnerable to collision and have no preimage resistance, the most important feature. Because of that you can DOS conversations and people by sending dog images with the same hash as a CSAM: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
-
UK cybersecurity chiefs back plan to scan phones for child abuse images | GCHQ | The Guardian
Specifically the fact that you can have one hash on two images, for example. There are other ways to abuse the CSAM system, which is confirmed by several researchers (one, two). And Apple saying it's not a concern... only to pull back on these plans.
- Frage zur drohenden Chatkontrolle
- Apple’s CSAM troubles may be back, as EU plans a law requiring detection
neural-hash-collider
- Daily General Discussion - October 27, 2022
- [@tim_cook about privacy] “We believe privacy is a fundamental human right, and the best technology is one that people can trust. At Apple, we’re constantly innovating to give our users more control over how their data is used and the choice with whom to share it.”
- Under pressure from Russian government Google, Apple remove opposition leader's Navalny app from stores as Russian elections begin
-
Apple delays iPhone photo-scanning plan amid fierce backlash
That assumes the hash is base 26 which would be fun, but most hashing systems including NeuralHash are hexadecimal. NeuralHash also outputs 24 character hashes so there are 1624 possible NeuralHashes. However all of that ignores that NeuralHash is designed so that visually similar images will return the same hash on purpose. You can even provide two images of your choosing to this library and it will make them collide https://github.com/anishathalye/neural-hash-collider
-
Delays Aren't Good Enough–Apple Must Abandon Its Surveillance Plans
This is incorrect.
The images in this link [1], are completely different. One is a cat, one is a dog. Same hash produced for both.
[1] https://github.com/anishathalye/neural-hash-collider
- GitHub - anishathalye/neural-hash-collider: Preimage attack against NeuralHash 💣
- The All-Seeing "i": Apple Just Declared War on Your Privacy
-
Tell Apple: Don’t Scan Our Phones
And here: https://github.com/anishathalye/neural-hash-collider
- Apple Just Gave Millions of Users a Reason to Quit Their iPhones
-
Apple Just Gave Millions Of Users A Reason To Quit Their iPhones
Also, Apple’s NeuralHash is rather prone to hash collisions, i.e. false positives, so you should absolutely expect at least some of your on-device pics to be viewed by unauthorized Apple/government personell.
What are some alternatives?
GmsCore - Free implementation of Play Services
hardened_malloc - Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
neuralhash-collisions - A catalog of naturally occurring images whose Apple NeuralHash is identical.
onnxruntime - ONNX Runtime: cross-platform, high performance ML inferencing and training accelerator
json - JSON for Modern C++
OpenWifiPass - An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.
harbormaster
ExpansionCards - Reference designs and documentation to create Expansion Cards for the Framework Laptop
glodroid_manifest - Android port that aims to bring both user- and developer-friendly experience in using AOSP with a set of single-board computers (SBC), phones and other devices.
photoshopCClinux - Photoshop CC v19 installer for Gnu/Linux