ThreatExchange
lazy_importer
ThreatExchange | lazy_importer | |
---|---|---|
7 | 1 | |
1,123 | 1,492 | |
1.4% | - | |
9.2 | 4.2 | |
7 days ago | 9 months ago | |
C++ | C++ | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThreatExchange
- Meta Launches Open-Source Tool 'Hasher-Matcher-Actioner' To Prevent Spread of Terror Content
- GitHub - facebook/ThreatExchange: Share threat information with vetted partners
-
Strengthening Our Efforts Against the Spread of Non-Consensual Intimate Images
It’s somewhere in the FAQ at https://stopncii.org/faq/, but It’s PDQ for photos (https://github.com/facebook/ThreatExchange/tree/main/pdq) and MD5 for videos. PDQ is resistant to some modifications (it focuses on the ones that come from regular usage, such as changing the format from gif to jpg, or a filter changing colors or brightness), but it’s not as resistant to modifications as you could get by training dedicated classifiers or other approaches that you might do with the original media or by storing more context, which StopNCII chose not to do.
-
Stopncii.org – Client Side Hashing to Prevent Spread of NCII, Preserve Privacy
The FAQ (https://stopncii.org/faq/) mentions its using PDQ (https://github.com/facebook/ThreatExchange/tree/main/pdq) for images, and MD5 for videos. Companies would then use hashes to scan their platform.
Meta also has a post on it: https://about.fb.com/news/2021/12/strengthening-efforts-agai...
-
Proposed illegal image detectors on devices are ‘easily fooled’
Notably, none of the the algorithms tested in the cited study are Apple's NeuralHash, or comparable algorithms. They look at aHash, pHash (plus a variant thereof), dHash, and and PDQ (used at Facebook for similar applications, apparently). The first 4 data to between 2004 and 2010; the last is more recent, but conceptually similar - the citation [0] for PDQ puts it in the same bucket of 'shallower, stricter, cheaper, faster' algorithms as the first four.
No one has proposed any of those as 'illegal image detectors'. Apple's NeuralHash may or may not be robust to the same or different perturbations but the cited study provides basically no new information to inform the conversation its press release wants to be a part of.
[0]: https://github.com/facebook/ThreatExchange/blob/main/hashing...
lazy_importer
What are some alternatives?
pHash - pHash - the open source perceptual hash library
EDRSandblast
vpv - Image viewer for image processing experts
WechatExporter - Wechat Chat History Exporter 微信聊天记录导出备份程序
vmpfix - Universal x86/x64 VMProtect 2.0-3.X Import fixer
R3nzSkin - Skin changer for League of Legends (LOL)
llvm-string-obfuscator - LLVM String Obfuscator
inline_syscall - Inline syscalls made easy for windows on clang
UBoat - HTTP Botnet
peekaboo - Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Osiris - Free and open-source game hack for Counter-Strike 2, written in modern C++. For Windows and Linux.