neural-hash-collider
owasp-mastg
Our great sponsors
neural-hash-collider | owasp-mastg | |
---|---|---|
37 | 22 | |
651 | 11,272 | |
- | 1.4% | |
1.2 | 8.3 | |
about 1 year ago | 5 days ago | |
Python | Python | |
MIT License | Creative Commons Attribution Share Alike 4.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
neural-hash-collider
- Daily General Discussion - October 27, 2022
- [@tim_cook about privacy] “We believe privacy is a fundamental human right, and the best technology is one that people can trust. At Apple, we’re constantly innovating to give our users more control over how their data is used and the choice with whom to share it.”
- Under pressure from Russian government Google, Apple remove opposition leader's Navalny app from stores as Russian elections begin
-
Apple delays iPhone photo-scanning plan amid fierce backlash
That assumes the hash is base 26 which would be fun, but most hashing systems including NeuralHash are hexadecimal. NeuralHash also outputs 24 character hashes so there are 1624 possible NeuralHashes. However all of that ignores that NeuralHash is designed so that visually similar images will return the same hash on purpose. You can even provide two images of your choosing to this library and it will make them collide https://github.com/anishathalye/neural-hash-collider
-
Delays Aren't Good Enough–Apple Must Abandon Its Surveillance Plans
This is incorrect.
The images in this link [1], are completely different. One is a cat, one is a dog. Same hash produced for both.
[1] https://github.com/anishathalye/neural-hash-collider
- GitHub - anishathalye/neural-hash-collider: Preimage attack against NeuralHash 💣
- The All-Seeing "i": Apple Just Declared War on Your Privacy
-
Tell Apple: Don’t Scan Our Phones
And here: https://github.com/anishathalye/neural-hash-collider
- Apple Just Gave Millions of Users a Reason to Quit Their iPhones
-
Apple Just Gave Millions Of Users A Reason To Quit Their iPhones
Also, Apple’s NeuralHash is rather prone to hash collisions, i.e. false positives, so you should absolutely expect at least some of your on-device pics to be viewed by unauthorized Apple/government personell.
owasp-mastg
- More ways to identify independently security tested apps on Google Play
-
Google Play rolls out an "Independent security review" badge for apps
https://mas.owasp.org/ :
> The OWASP Mobile Application Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS) and a comprehensive testing guide (OWASP MASTG) that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases
- Need Help on Patching
- The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
- Mobile game security - how to?
-
Are android bugs mostly api and web ?
Have a look at the OWASP Mobile Application Testing Guide https://github.com/OWASP/owasp-mastg
-
How can we get our Apps validated against OWASP's MASVS and does it shown on the PlayStore?
owasp-mastg
-
How do you check your app for security issues?
Be aware that this kind of tools shouldn't be seen as a substitute for a manual and thorough pentesting of the application. As u/StoryOfDavid suggested decompiling the application (I usually use jadx for this) and using Wireshark to check the network traffic are good ways to start assessing the security of your application. If you want to be thorough I suggest going through the OWASP-MSTG guide (now renamed to MASTG) which provides a categorization of possible security issues, with a description of the problem and actionable ways to statically/dynamically analyze your application.
-
Securing API keys, clientId, clientSecret etc while distributing to App Store? Ways to prevent reverse engineering?
Check out OWASP, they have plenty documentation about threat modeling and attack vectors for mobile apps. Regarding jailbreak detection, see the following: https://github.com/OWASP/owasp-mstg/blob/master/Document/0x06j-Testing-Resiliency-Against-Reverse-Engineering.md
-
Moving from Web application pentesting to mobile.
- OWASP is as usual a good resource: https://owasp.org/www-project-mobile-security-testing-guide/
What are some alternatives?
hardened_malloc - Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
H4CKINTO - H4CKINTO - Remote Android Management Suite
neuralhash-collisions - A catalog of naturally occurring images whose Apple NeuralHash is identical.
owasp-masvs - The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.
json - JSON for Modern C++
grapefruit - (WIP) Runtime Application Instruments for iOS. Previously Passionfruit
harbormaster
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
glodroid_manifest - Android port that aims to bring both user- and developer-friendly experience in using AOSP with a set of single-board computers (SBC), phones and other devices.
hacktricks - Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
AppleNeuralHash2ONNX - Convert Apple NeuralHash model for CSAM Detection to ONNX.
audiohq_module - Provide binary and apk for controlling each applications volume using Magisk