Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
AppleNeuralHash2ONNX Alternatives
Similar projects and alternatives to AppleNeuralHash2ONNX
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
ExpansionCards
Reference designs and documentation to create Expansion Cards for the Framework Laptop
-
hardened_malloc
Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
appleprivacyletter
An open letter against Apple's new privacy-invasive client-side content scanning.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
AppleNeuralHash2ONNX reviews and mentions
- Legit app in Google Play turns malicious and sends mic recordings every 15 minutes
- Daily General Discussion - October 27, 2022
-
How did apple train its cp filtering algorithm?
Perhaps you're referring to the hash collisions that were generated for the client-side NeuralHash which was reverse engineered about a year ago: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- [Request] A way to remove Apple’s new NeuralHash ( iCloud CSAM scanner )
-
Google AI flags parents' accounts for potential abuse over kid's photos
Except Apple’s hashes have collisions where images that are similar in content but not identical will have the same hash. Meaning their process will have the same result: benign images being flagged as CSAM. See an example here https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
- Apple Remains Silent About Plans to Detect Known CSAM Stored in iCloud Photos
-
Apple should scan iPhones for child abuse images, says scanning technology inventor
perceptual hashes are completely broken due to false positives, like making a picture of a dog having the same hash as CSAM images. They are vulnerable to collision and have no preimage resistance, the most important feature. Because of that you can DOS conversations and people by sending dog images with the same hash as a CSAM: https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1
-
UK cybersecurity chiefs back plan to scan phones for child abuse images | GCHQ | The Guardian
Specifically the fact that you can have one hash on two images, for example. There are other ways to abuse the CSAM system, which is confirmed by several researchers (one, two). And Apple saying it's not a concern... only to pull back on these plans.
- Frage zur drohenden Chatkontrolle
- Apple’s CSAM troubles may be back, as EU plans a law requiring detection
-
A note from our sponsor - InfluxDB
www.influxdata.com | 19 Apr 2024
Stats
AsuharietYgvar/AppleNeuralHash2ONNX is an open source project licensed under Apache License 2.0 which is an OSI approved license.
The primary programming language of AppleNeuralHash2ONNX is Python.
Popular Comparisons
- AppleNeuralHash2ONNX VS GmsCore
- AppleNeuralHash2ONNX VS hardened_malloc
- AppleNeuralHash2ONNX VS onnxruntime
- AppleNeuralHash2ONNX VS OpenWifiPass
- AppleNeuralHash2ONNX VS ExpansionCards
- AppleNeuralHash2ONNX VS neuralhash-collisions
- AppleNeuralHash2ONNX VS neural-hash-collider
- AppleNeuralHash2ONNX VS img-cryptor
- AppleNeuralHash2ONNX VS nhcalc
- AppleNeuralHash2ONNX VS appleprivacyletter