Expert help needed to decode rare piece of space history: Lunokhod data tapes
10 by pamoroso | 0 comments on Hacker News.
Saturday, August 21, 2021
New top story on Hacker News: I won't be posting any more preimages against neuralhash for now
I won't be posting any more preimages against neuralhash for now
94 by nullc | 0 comments on Hacker News.
I've created and posted on github a number of visually high quality preimages against Apple's 'neuralhash' [1][2] in recent days. I won't be posting any more preimages for the moment. I've come to learn that Apple has begun responding to this issue by telling journalists that they will deploy a different version of the hash function[3]. Given Apple's consistent dishonest[4] conduct on the subject I'm concerned that they'll simply add the examples here to their training set to make sure they fix those, without resolving the fundamental weaknesses of the approach, or that they'll use improvements in the hashing function to obscure the gross recklessness of their whole proposal. I don't want to be complicit in improving a system with such a potential for human rights abuses. I'd like to encourage people to read some of my posts on the Apple proposal to scan user's data which were made prior to the hash function being available. I'm doubtful they'll meaningfully fix the hash function-- this entire approach is flawed-- but even if they do, it hardly improves the ethics of the system at all. In my view the gross vulnerability of the hash function is mostly relevant because it speaks to a pattern of incompetence and a failure to adequately consider attacks and their consequences. - https://ift.tt/3D66hSq Your device scanning and reporting you violates its ethical duty as your trusted agent. - https://ift.tt/381zeR8 Apple's human review exists for the express purpose of quashing your fourth amendment right against warrantless search. - https://ift.tt/3giR8mX Apple is not being coerced to perform these searches and if they were that would make their actions less ethical, not more. - https://ift.tt/3zavPeR Apple uses complex crypto to protect themselves from accountability. - https://ift.tt/3B15noB A simplified explanation of a private set intersection. - https://ift.tt/2WcA0Zd Perceptual hashes at best slightly improve resistance to false negatives at the expense of destroying any kind of cryptographic protection against false positives (as this thread has shown!). Smart perverts can evade any perceptual hash, dumb ones won't alter the images. - https://ift.tt/383uVow Apple's system and ones like it likely create an incentive to abuse more children And these posts written after: - https://ift.tt/3zeeYbi A second "secret" hash function cannot be secret from the state actors that produce the database for Apple. - https://ift.tt/3j7YcoE fuzzy hashes with resistance against false positives tracable to sha256 are possible, but require you to value privacy over avoiding false negatives. [1] https://ift.tt/3mohBn8 [2] https://ift.tt/3y6qDHM [3] "Apple however told Motherboard in an email that that version analyzed by users on GitHub is a generic version, and not the one final version that will be used for iCloud Photos CSAM detection." https://ift.tt/3k4yDnF [4] https://ift.tt/2XQadqB
94 by nullc | 0 comments on Hacker News.
I've created and posted on github a number of visually high quality preimages against Apple's 'neuralhash' [1][2] in recent days. I won't be posting any more preimages for the moment. I've come to learn that Apple has begun responding to this issue by telling journalists that they will deploy a different version of the hash function[3]. Given Apple's consistent dishonest[4] conduct on the subject I'm concerned that they'll simply add the examples here to their training set to make sure they fix those, without resolving the fundamental weaknesses of the approach, or that they'll use improvements in the hashing function to obscure the gross recklessness of their whole proposal. I don't want to be complicit in improving a system with such a potential for human rights abuses. I'd like to encourage people to read some of my posts on the Apple proposal to scan user's data which were made prior to the hash function being available. I'm doubtful they'll meaningfully fix the hash function-- this entire approach is flawed-- but even if they do, it hardly improves the ethics of the system at all. In my view the gross vulnerability of the hash function is mostly relevant because it speaks to a pattern of incompetence and a failure to adequately consider attacks and their consequences. - https://ift.tt/3D66hSq Your device scanning and reporting you violates its ethical duty as your trusted agent. - https://ift.tt/381zeR8 Apple's human review exists for the express purpose of quashing your fourth amendment right against warrantless search. - https://ift.tt/3giR8mX Apple is not being coerced to perform these searches and if they were that would make their actions less ethical, not more. - https://ift.tt/3zavPeR Apple uses complex crypto to protect themselves from accountability. - https://ift.tt/3B15noB A simplified explanation of a private set intersection. - https://ift.tt/2WcA0Zd Perceptual hashes at best slightly improve resistance to false negatives at the expense of destroying any kind of cryptographic protection against false positives (as this thread has shown!). Smart perverts can evade any perceptual hash, dumb ones won't alter the images. - https://ift.tt/383uVow Apple's system and ones like it likely create an incentive to abuse more children And these posts written after: - https://ift.tt/3zeeYbi A second "secret" hash function cannot be secret from the state actors that produce the database for Apple. - https://ift.tt/3j7YcoE fuzzy hashes with resistance against false positives tracable to sha256 are possible, but require you to value privacy over avoiding false negatives. [1] https://ift.tt/3mohBn8 [2] https://ift.tt/3y6qDHM [3] "Apple however told Motherboard in an email that that version analyzed by users on GitHub is a generic version, and not the one final version that will be used for iCloud Photos CSAM detection." https://ift.tt/3k4yDnF [4] https://ift.tt/2XQadqB
Subscribe to:
Comments (Atom)
Pages - Menu
About Me
Blog Archive
-
▼
2022
(46)
-
▼
January
(46)
- New top story on Hacker News: Modeling Uncertainty...
- New top story on Hacker News: Study: 1960 ramjet d...
- New top story on Hacker News: Hollowed-Out, 4k-Yea...
- New top story on Hacker News: Why Fortran is easy ...
- New top story on Hacker News: Antenna Theory
- New top story on Hacker News: Between Frogs and Go...
- New top story on Hacker News: Motion (YC W20) is h...
- New top story on Hacker News: Notes from the End o...
- New top story on Hacker News: The dirty work of cl...
- New top story on Hacker News: The Relativity of Wr...
- New top story on Hacker News: The Cryptography of ...
- New top story on Hacker News: Three ways of handli...
- New top story on Hacker News: The late rloew (Rudo...
- New top story on Hacker News: Keyboard lets people...
- New top story on Hacker News: Farmers facing ferti...
- New top story on Hacker News: Honda Clocks Are Stu...
- New top story on Hacker News: At This Armenian Res...
- New top story on Hacker News: Ideas Want to Be Shared
- New top story on Hacker News: Mozilla Foundation p...
- New top story on Hacker News: Twilio suspended acc...
- New top story on Hacker News: We handle 80TB and 5...
- New top story on Hacker News: Six Julia Frameworks...
- New top story on Hacker News: Why might you run yo...
- New top story on Hacker News: Simple Dungeon Map G...
- New top story on Hacker News: We're two middle sch...
- New top story on Hacker News: NAPI-RS v2
- New top story on Hacker News: Neural Network from ...
- New top story on Hacker News: Project Mouse Tailor
- New top story on Hacker News: Workbench Nostalgia
- New top story on Hacker News: My Writing Finances,...
- New top story on Hacker News: My Personal Note Tak...
- New top story on Hacker News: 1984 – Comrade Dad
- New top story on Hacker News: Inversed Mandelbrot ...
- New top story on Hacker News: Digital real estate ...
- New top story on Hacker News: Viewstamped Replicat...
- New top story on Hacker News: Did a Cuttlefish Wri...
- New top story on Hacker News: I switched my newsle...
- New top story on Hacker News: End of the line fina...
- New top story on Hacker News: How Audio Fingerprin...
- New top story on Hacker News: New RISC-V Svnapot E...
- New top story on Hacker News: Astronomers uncover ...
- New top story on Hacker News: Winnie the Pooh is n...
- New top story on Hacker News: The Interledger Prot...
- New top story on Hacker News: Go Fuzzing
- New top story on Hacker News: All of Wittgenstein ...
- New top story on Hacker News: Living in Expectatio...
-
▼
January
(46)
Labels
- 'Dedication 5' (1)
- "Miley Cyrus (1)
- Ander Herrera (1)
- Bundesliga (1)
- Catherine Zeta Jones (1)
- CFL (1)
- Chennai Express (1)
- Chris Brown (2)
- Eid Mubarak Wishes (1)
- Electric Zoo (1)
- Hacker News (7613)
- James Spader (1)
- kim jong un pochonbo electronic ensemble kenji fujimoto hyon song-wol pictures (2)
- Lamar Odom (1)
- Lavabit (2)
- Lukaku (1)
- Michael Girgenti (1)
- michael jackson games michael jackson songs michael jackson pictures michael jackson videos michael jackson (1)
- NAACP (21)
- Nexus 4 Price Drop Available to Some Past Buyers (1)
- Nintendo 2DS (1)
- Powerball winner: 'I don't want to work ... for the rest of my life' (1)
- Pretty Little Liars (1)
- Ribery (1)
- Riley Cooper (1)
- Satyagraha (1)
- Seamus Heaney (2)
- Sylvie van der Vaart (1)
- Taste of the Danforth (1)
- UEFA (1)
- US PGA (1)
- Yasin Bhatkal (1)