Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
ThreatExchange Alternatives
Similar projects and alternatives to ThreatExchange based on common topics and language
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
lazy_importer
library for importing functions from dlls in a hidden, reverse engineer unfriendly way
-
DISCoHAsH
:rocket: DISCoHAsH - Simple, fast, quality hash in 120 lines. 10GB/s serial (depending on hardware). Also in NodeJS
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
ThreatExchange reviews and mentions
- Meta Launches Open-Source Tool 'Hasher-Matcher-Actioner' To Prevent Spread of Terror Content
- GitHub - facebook/ThreatExchange: Share threat information with vetted partners
-
Strengthening Our Efforts Against the Spread of Non-Consensual Intimate Images
It’s somewhere in the FAQ at https://stopncii.org/faq/, but It’s PDQ for photos (https://github.com/facebook/ThreatExchange/tree/main/pdq) and MD5 for videos. PDQ is resistant to some modifications (it focuses on the ones that come from regular usage, such as changing the format from gif to jpg, or a filter changing colors or brightness), but it’s not as resistant to modifications as you could get by training dedicated classifiers or other approaches that you might do with the original media or by storing more context, which StopNCII chose not to do.
-
Stopncii.org – Client Side Hashing to Prevent Spread of NCII, Preserve Privacy
The FAQ (https://stopncii.org/faq/) mentions its using PDQ (https://github.com/facebook/ThreatExchange/tree/main/pdq) for images, and MD5 for videos. Companies would then use hashes to scan their platform.
Meta also has a post on it: https://about.fb.com/news/2021/12/strengthening-efforts-agai...
-
Proposed illegal image detectors on devices are ‘easily fooled’
Notably, none of the the algorithms tested in the cited study are Apple's NeuralHash, or comparable algorithms. They look at aHash, pHash (plus a variant thereof), dHash, and and PDQ (used at Facebook for similar applications, apparently). The first 4 data to between 2004 and 2010; the last is more recent, but conceptually similar - the citation [0] for PDQ puts it in the same bucket of 'shallower, stricter, cheaper, faster' algorithms as the first four.
No one has proposed any of those as 'illegal image detectors'. Apple's NeuralHash may or may not be robust to the same or different perturbations but the cited study provides basically no new information to inform the conversation its press release wants to be a part of.
[0]: https://github.com/facebook/ThreatExchange/blob/main/hashing...
-
A note from our sponsor - InfluxDB
www.influxdata.com | 27 Apr 2024
Stats
facebook/ThreatExchange is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.
The primary programming language of ThreatExchange is C++.
Popular Comparisons
Sponsored