ThreatExchange
DISCoHAsH
ThreatExchange | DISCoHAsH | |
---|---|---|
7 | 3 | |
1,123 | 217 | |
1.4% | 0.5% | |
9.2 | 6.8 | |
7 days ago | 10 months ago | |
C++ | C++ | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThreatExchange
- Meta Launches Open-Source Tool 'Hasher-Matcher-Actioner' To Prevent Spread of Terror Content
- GitHub - facebook/ThreatExchange: Share threat information with vetted partners
-
Strengthening Our Efforts Against the Spread of Non-Consensual Intimate Images
It’s somewhere in the FAQ at https://stopncii.org/faq/, but It’s PDQ for photos (https://github.com/facebook/ThreatExchange/tree/main/pdq) and MD5 for videos. PDQ is resistant to some modifications (it focuses on the ones that come from regular usage, such as changing the format from gif to jpg, or a filter changing colors or brightness), but it’s not as resistant to modifications as you could get by training dedicated classifiers or other approaches that you might do with the original media or by storing more context, which StopNCII chose not to do.
-
Stopncii.org – Client Side Hashing to Prevent Spread of NCII, Preserve Privacy
The FAQ (https://stopncii.org/faq/) mentions its using PDQ (https://github.com/facebook/ThreatExchange/tree/main/pdq) for images, and MD5 for videos. Companies would then use hashes to scan their platform.
Meta also has a post on it: https://about.fb.com/news/2021/12/strengthening-efforts-agai...
-
Proposed illegal image detectors on devices are ‘easily fooled’
Notably, none of the the algorithms tested in the cited study are Apple's NeuralHash, or comparable algorithms. They look at aHash, pHash (plus a variant thereof), dHash, and and PDQ (used at Facebook for similar applications, apparently). The first 4 data to between 2004 and 2010; the last is more recent, but conceptually similar - the citation [0] for PDQ puts it in the same bucket of 'shallower, stricter, cheaper, faster' algorithms as the first four.
No one has proposed any of those as 'illegal image detectors'. Apple's NeuralHash may or may not be robust to the same or different perturbations but the cited study provides basically no new information to inform the conversation its press release wants to be a part of.
[0]: https://github.com/facebook/ThreatExchange/blob/main/hashing...
DISCoHAsH
-
Show HN: Discohash – simply, quality, fast hash
// https://github.com/dosyago/discohash
- Show HN: BEBB4185 – simple hash that passes SMHasher, 2-5GB/s
What are some alternatives?
pHash - pHash - the open source perceptual hash library
pwnagotchi-display-password-plugin - Pwnagotchi plugin to display the most recently cracked password on the Pwnagotchi face
vpv - Image viewer for image processing experts
pwnagotchi-plugins
number-speller - Spell number words.
floppsy - :baby_chick: floppsy - SMHasher-passing 200Mb/s hash using floating-point ops
smhasher - Hash function quality and speed tests
obs-studio-node - libOBS (OBS Studio) for Node.Js, Electron and similar tools
react-native-quick-crypto - ⚡️ A fast implementation of Node's `crypto` module written in C/C++ JSI
lumi - Lumi is a Node.js module that allows you to adjust the brightness of your internal and external monitors.
YouTubeDiscordPresence - An extension that takes data directly from the YouTube video playing on the browser and displays it as a rich presence on Discord. Works similar to the Spotify Discord rich presence.