Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Potato Salad
Oct 23, 2014

nobody cares


Methanar posted:

1) Leaked photos embarrassing the united states around war crimes in the middle east appear in the news.
2) photos appear to have been taken with a mobile device, possibly an iphone
3) mystery new hash appears in the CSAM database
4) another whistleblower crime prevented

eh it makes no difference, remember that NYT deliberately buried Abu Ghraib

Adbot
ADBOT LOVES YOU

I would blow Dane Cook
Dec 26, 2008
Can you tell the difference between these two pictures? Because Apple's Neural Network can't





$ python3 nnhash.py NeuralHash/model.onnx neuralhash_128x96_seed1.dat beagle360.png
59a34eabe31910abfb06f308
$ python3 nnhash.py NeuralHash/model.onnx neuralhash_128x96_seed1.dat collision.png
59a34eabe31910abfb06f308


https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.

I would blow Dane Cook posted:

Can you tell the difference between these two pictures? Because Apple's Neural Network can't





$ python3 nnhash.py NeuralHash/model.onnx neuralhash_128x96_seed1.dat beagle360.png
59a34eabe31910abfb06f308
$ python3 nnhash.py NeuralHash/model.onnx neuralhash_128x96_seed1.dat collision.png
59a34eabe31910abfb06f308


https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX/issues/1

well, i guess we found the one-in-a-trillion chance. there can't be too many more of those, surely

Nitr0
Aug 17, 2005

IT'S FREE REAL ESTATE

Pile Of Garbage posted:

lol perfect

earlier this year internal IT setup a thing that inserts a big disclaimer into the body of any external e-mail you receive saying that it's from external and not to click any links blah blah. this of course means that whenever i get a new e-mail notification pop-up on my PC or phone all it has shows the subject and the first sentence of the fuckin disclaimer thus rendering the message preview useless.

cause people are morons and need the disclaimer, how else would you do it?

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock

infernal machines posted:

well, i guess we found the one-in-a-trillion chance. there can't be too many more of those, surely

this is a deliberate collision though, I assume the one in a trillion or whatever refers to collisions between random unrelated pictures

the tech in how apple is scanning for images and trying to ensure user privacy is pretty interesting, but of course, like with bitcoin, the tech might be interesting but its use in practice is horrible

flakeloaf
Feb 26, 2003

Still better than android clock

Nitr0 posted:

cause people are morons and need the disclaimer, how else would you do it?

send them quarterly emails from external sources with links in them, and anyone who clicks the link has to do their work with a pencil from now on

Methanar
Sep 26, 2013

by the sex ghost

flakeloaf posted:

send them quarterly emails from external sources with links in them, and anyone who clicks the link has to do their work with a pencil from now on

The russians used a typewriter

duz
Jul 11, 2005

Come on Ilhan, lets go bag us a shitpost


Methanar posted:

1) Leaked photos embarrassing the united states around war crimes in the middle east appear in the news.
2) photos appear to have been taken with a mobile device, possibly an iphone
3) mystery new hash appears in the CSAM database
4) another whistleblower crime prevented

or just, you know, force apple to block/detect it
thats even if they needed to

BlankSystemDaemon
Mar 13, 2009



ymgve posted:

this is a deliberate collision though, I assume the one in a trillion or whatever refers to collisions between random unrelated pictures

the tech in how apple is scanning for images and trying to ensure user privacy is pretty interesting, but of course, like with bitcoin, the tech might be interesting but its use in practice is horrible
you put your finger on what makes a hash cryptographically secure and why sha1 is deprecated for that very purpose

the fact of the matter is that they're using a hash that's supposed to do one thing but in practice can be (ab)used for many other things

Shame Boy
Mar 2, 2010

Nitr0 posted:

cause people are morons and need the disclaimer, how else would you do it?

put it somewhere other than the top

Methanar
Sep 26, 2013

by the sex ghost

duz posted:

or just, you know, force apple to block/detect it
thats even if they needed to

The difference is the possibility of apple having the power to detect arbitrary content on local devices and then there is having taken the possibility and having made it a reality with an established software suite and a pipeline built and released to production for the explicit purpose of identifying the 'wrong' material.

Microsoft has the possibility of scanning every device in the world for the wrong material during windows update, but they haven't actually done it, maybe.

Crust First
May 1, 2013

Wrong lads.

Shame Boy posted:

put it somewhere other than the top

in my experience people don't read anything at all past the first few sentences of an email, so nobody will see it if it isn't at the top.

plus it would have to compete with every other pointless disclaimer people attach to emails now, about how it's private and intended for the recipient and a crime to read it or whatever, it's all white noise down there.

Pile Of Garbage
May 28, 2007



Nitr0 posted:

cause people are morons and need the disclaimer, how else would you do it?

oh yeah don't get me wrong i'm not saying that it isn't important. just having a whinge really

edit: this is what the e-mails look like, they get the "[EXTERNAL]" prefix in the subject and a styled HTML div added at the start of the body:



also yeah, im getting e-mails about oracle, it sucks

Pile Of Garbage fucked around with this message at 15:15 on Aug 18, 2021

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock

BlankSystemDaemon posted:

you put your finger on what makes a hash cryptographically secure and why sha1 is deprecated for that very purpose

the fact of the matter is that they're using a hash that's supposed to do one thing but in practice can be (ab)used for many other things

it is not a cryptographically secure hash and it was never meant to be, since its purpose is to allow small differences like cropping, color changing etc to not affect the hash

Nitr0
Aug 17, 2005

IT'S FREE REAL ESTATE

Pile Of Garbage posted:

oh yeah don't get me wrong i'm not saying that it isn't important. just having a whinge really

edit: this is what the e-mails look like, they get the "[EXTERNAL]" prefix in the subject and a styled HTML div added at the start of the body:



also yeah, im getting e-mails about oracle, it sucks

can’t stand companies that dick with the subject, i understand the annoying banner but adding [EXTERNAL] to all emails is a pleb move

Pile Of Garbage
May 28, 2007



i work for an MSP so often my colleagues will e-mail me from their customer e-mail address which ofc gets the whole "[EXTERNAL]" treatment lol. in fact that screenshot i posted was of an e-mail from a colleague sent from their state gov dept email address...

Soylent Pudding
Jun 22, 2007

We've got people!


Crust First posted:


plus it would have to compete with every other pointless disclaimer people attach to emails now, about how it's private and intended for the recipient and a crime to read it or whatever, it's all white noise down there.

I've thought about writing a script delete all messages and make them accept some crazy terms and conditions before resending it.

quote:

This is an automated response. Your message has not been delivered. By emailing this address you waive all rights of confidentiality and agree to the terms described below.

To deliver your message and any future message send it to this address and begin your subject line with "I ACCEPT:" to accept the below terms. Any email coming from your address not accepting the below terms will be automatically deleted.

You give the recipient authorization for worldwide publication, as well as waive all legal claims resulting from said publication. You agree all disputes under the laws of $state in $city_courthouse. You agree these terms constitute the entire agreement and supersede and overrule any contrary language in the message you wish to deliver."

Pile Of Garbage
May 28, 2007



put the disclaimer in your MTA's HELO response CAN'T BLAME ME YOU ACCEPTED THE TERMS BY CONNECTING!!!

30 TO 50 FERAL HOG
Mar 2, 2005



Soylent Pudding posted:

I've thought about writing a script delete all messages and make them accept some crazy terms and conditions before resending it.

lol big "attention facebook" vibes here

Soylent Pudding
Jun 22, 2007

We've got people!


30 TO 50 FERAL HOG posted:

lol big "attention facebook" vibes here

Oh I know it's stupid and legally useless. The point is to troll the people who send me email messages with all the white noise disclaimers.

Also :effort:

post hole digger
Mar 21, 2011

Nitr0 posted:

can’t stand companies that dick with the subject, i understand the annoying banner but adding [EXTERNAL] to all emails is a pleb move

there was no way to tag external emails in the UI in Gmail Enterprise without adding it to the subject line until like 2 months ago lmao

Powerful Two-Hander
Mar 10, 2004

Mods please change my name to "Tooter Skeleton" TIA.


Ansible Adams posted:

Gmail Enterprise

that's the real lmao

Pile Of Garbage
May 28, 2007



Ansible Adams posted:

there was no way to tag external emails in the UI in Gmail Enterprise without adding it to the subject line until like 2 months ago lmao

that's been a feature in exchange and every single other MTA since the last decade at least so yeah:

Powerful Two-Hander posted:

that's the real lmao

Shame Boy
Mar 2, 2010

ymgve posted:

it is not a cryptographically secure hash and it was never meant to be, since its purpose is to allow small differences like cropping, color changing etc to not affect the hash

i swear i read a name for this sort of thing a long-rear end time ago but i've never been able to find it since. it's like a hash, but instead of a small change producing the largest difference possible, a small change produces the smallest change possible, so comparing "hashes" directly compares similarity of contents. i implemented something like that waaay back when i needed to organize a huge database of millions of pictures, so i could store these "closeness hashes" in the database and sort everything by that so duplicates are easy to spot (they either have the same value or sort right next to each other) and it's easy to check a new image being inserted to see if it's a duplicate. wish i could remember the name i found for it though because "hash" really doesn't describe it very well...

e: oh and then years later my exact solution (including the exact algorithm i came up with for calculating it) showed up in a commercial product and then in a stack overflow answer, which sucks (i never got anything out of it and now they're making money off it) but still it's kinda neat that i came up with it in like highschool and now it's A Thing

Shame Boy fucked around with this message at 18:43 on Aug 18, 2021

Methanar
Sep 26, 2013

by the sex ghost

Shame Boy posted:

i swear i read a name for this sort of thing a long-rear end time ago but i've never been able to find it since. it's like a hash, but instead of a small change producing the largest difference possible, a small change produces the smallest change possible, so comparing "hashes" directly compares similarity of contents. i implemented something like that waaay back when i needed to organize a huge database of millions of pictures, so i could store these "closeness hashes" in the database and sort everything by that so duplicates are easy to spot (they either have the same value or sort right next to each other) and it's easy to check a new image being inserted to see if it's a duplicate. wish i could remember the name i found for it though because "hash" really doesn't describe it very well...

e: oh and then years later my exact solution (including the exact algorithm i came up with for calculating it) showed up in a commercial product and then in a stack overflow answer, which sucks (i never got anything out of it and now they're making money off it) but still it's kinda neat that i came up with it in like highschool and now it's A Thing

perceptual hash

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock
the attack scenario where someone creates an image that has the same hash as child porn is a bit narrow, because the hash database is in "salted" form on the devices so you can't just extract the hashes to target

the major problem as I see it is that the CSAM database is unaudited so you have no clue what is in there, or what will be in there in the future

champagne posting
Apr 5, 2006

YOU ARE A BRAIN
IN A BUNKER

Powerful Two-Hander posted:

that's the real lmao

a powerful curse

mystes
May 31, 2006

ymgve posted:

the attack scenario where someone creates an image that has the same hash as child porn is a bit narrow, because the hash database is in "salted" form on the devices so you can't just extract the hashes to target
This sounds convincing until you think about it for two seconds and realize that all someone has to do is extract the algorithm from the firmware and point it at 8chan or whatever for 5 minutes until they get hits.

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock

mystes posted:

This sounds convincing until you think about it for two seconds and realize that all someone has to do is extract the algorithm from the firmware and point it at 8chan or whatever for 5 minutes until they get hits.

the way it's designed, the client does not ever know if it gets a hit, so you can't do that

from the client's perspective, the encryption, encapsulation and uploading of metadata is the exact same no matter if the image is a hit or not

ymgve fucked around with this message at 20:25 on Aug 18, 2021

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock
of course someone at 8chan could pick some "classic" child porn images that are very likely to be in the database, but handling the raw explicit material is a threshold most normal trolls wouldn't dare to do

toiletbrush
May 17, 2010

ymgve posted:

the way it's designed, the client does not ever know if it gets a hit, so you can't do that

from the client's perspective, the encryption, encapsulation and uploading of metadata is the exact same no matter if the image is a hit or not
and even the server at the other end doesn't and can't know anything about the matches or even how many matches you've had until you've crossed a threshold.

It's all really clever but it's still a terrible idea.

mystes
May 31, 2006

ymgve posted:

the way it's designed, the client does not ever know if it gets a hit, so you can't do that

from the client's perspective, the encryption, encapsulation and uploading of metadata is the exact same no matter if the image is a hit or not
Does it just upload all the hashes or only ones that match a bloom filter or something?

ymgve
Jan 2, 2004


:dukedog:
Offensive Clock

toiletbrush posted:

and even the server at the other end doesn't and can't know anything about the matches or even how many matches you've had until you've crossed a threshold.

It's all really clever but it's still a terrible idea.

it's actually a bit more complicated - the client generates "tickets" for every image it handles and uploads them - the server instantly knows if it's a match (but won't know what picture was matched) - this would be a devastating info leak on its own, so to combat this, the clients are able to create "fake" tickets that look like matches that are not based on any image, but will be seen by the server as a match.

when the number of real + fake matches crosses a certain threshold, the outer encryption layer can be removed, and if the number of real matches also crosses a threshold, the inner encryption layer can be removed and it's flagged for review

ymgve fucked around with this message at 20:43 on Aug 18, 2021

ate shit on live tv
Feb 15, 2004

by Azathoth

Powerful Two-Hander posted:

e: lmao the "report phishing" tool actually forwards the mail to an external address and that got rejected because I'd forwarded an email marked for internal distribution only
Perfection.

Cybernetic Vermin
Apr 18, 2005

Powerful Two-Hander posted:

just got an internal email from IT security saying "as part of our cyber security awareness month, please go to this external site to test your cyber security knowledge!" So of course I reported it as phishing.

I assume I passed.

note: it is probably legit but this exact same thing happened before with legit emails from it security looking like phishing attempts so you'd think they'd have learned their lesson about sending random links to cybertesturself.com or whatever it was. They even mentioned it being from a specific vendor but the vendor name isn't in the URL, get it together!

e: lmao the "report phishing" tool actually forwards the mail to an external address and that got rejected because I'd forwarded an email marked for internal distribution only

the system works

Shame Boy
Mar 2, 2010

Methanar posted:

perceptual hash

it didn't include the word hash at all, it was a completely different word the author was proposing. also while they used image comparison as an example they were meaning for it to apply more generically about anything that worked like I described, where the value of the algorithm represented "closeness" rather than "uniqueness". i think it was an academic paper?

well regardless it apparently never caught on so it'd be useless to use it as a word these days but it's always bothered me that i forgot what it was :v:

ATM Machine
Aug 20, 2007

I paid $5 for this

Shame Boy posted:

it didn't include the word hash at all, it was a completely different word the author was proposing. also while they used image comparison as an example they were meaning for it to apply more generically about anything that worked like I described, where the value of the algorithm represented "closeness" rather than "uniqueness". i think it was an academic paper?

well regardless it apparently never caught on so it'd be useless to use it as a word these days but it's always bothered me that i forgot what it was :v:

You aren't thinking about Microsoft's PhotoDNA are you? There used to be a post or 2 about it online but it seems to have been scrubbed because I swear there was a semi-academic paper on this a few years ago as well.

From what I recall it'd break the image up into blocks, then apply a few filters to each - such as blurring it and scaling it up etc to account for modifications or cropping - then hash each modified block into a single hash?
he result of this was that it was able to produce hashes near enough to an upscaled/downscaled/cropped/whatever image and then determine if it matched something in CSAM or some other hash database.

Shame Boy
Mar 2, 2010

ATM Machine posted:

You aren't thinking about Microsoft's PhotoDNA are you? There used to be a post or 2 about it online but it seems to have been scrubbed because I swear there was a semi-academic paper on this a few years ago as well.

From what I recall it'd break the image up into blocks, then apply a few filters to each - such as blurring it and scaling it up etc to account for modifications or cropping - then hash each modified block into a single hash?
he result of this was that it was able to produce hashes near enough to an upscaled/downscaled/cropped/whatever image and then determine if it matched something in CSAM or some other hash database.

nah it wasn't that, though it worked kinda similarly, just not with blocks. it's not actually that complicated an idea so i'm sure it's been re-discovered many times by many different people and i probably wasn't the first or anything.

basically you'd apply various filters to normalize an image to a standard size 8-bit averaged-color square greyscale base image, then resize that down to one pixel by one pixel, and that's the first byte of the hash. then go back to the base, resize it to 2 pixels by 2 pixels, that's the next 4 bytes, and so on for as long as you wanna make it. put each one in a database and sort based on the hash column, then pick out ones that are within a certain distance of each other. this worked surprisingly well for how simple it was, like i used it on millions of images and it had an amazingly low false positive (and false negative, as far as I could measure that) rate. it could deal with moderate amounts of cropping, basically any amount of re-scaling, jpeg artifacting, etc. like i'm sure it would be trivial to defeat if you were actually trying to, but it took care of my use case of "here's a bunch of images and a constant stream of new ones coming in, find the duplicates" real well.

i actually tried variations of the "split it into blocks and calculate it separately for each block" like that microsoft thing sounds like it does but I always had trouble with being able to re-combine the blocks in a way that sorts by "similarness" in the database so ultimately i just stuck with this.

e: though to be clear the paper i'm thinking of wasn't about this or anything, it was a more generic proposal of kinds of "similarness-values" and what to call them :shrug:

Samuel L. ACKSYN
Feb 29, 2008


somebody on reddit discovered that their 3d printer printed this out while they were sleeping






https://www.thespaghettidetective.com/blog/2021/08/19/what-happened-last-night/

Adbot
ADBOT LOVES YOU

Midjack
Dec 24, 2007



Samuel L. ACKSYN posted:

somebody on reddit discovered that their 3d printer printed this out while they were sleeping






https://www.thespaghettidetective.com/blog/2021/08/19/what-happened-last-night/

i guess that's better than weev sending white power poo poo to your laserjet.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply