I noticed a bit of panic around here lately and as I have had to continuously fight against pedos for the past year, I have developed tools to help me detect and prevent this content.

As luck would have it, we recently published one of our anti-csam checker tool as a python library that anyone can use. So I thought I could use this to help lemmy admins feel a bit more safe.

The tool can either go through all your images via your object storage and delete all CSAM, or it canrun continuously and scan and delete all new images as well. Suggested option is to run it using --all once, and then run it as a daemon and leave it running.

Better options would be to be able to retrieve exact images uploaded via lemmy/pict-rs api but we’re not there quite yet.

Let me know if you have any issue or improvements.

EDIT: Just to clarify, you should run this on your desktop PC with a GPU, not on your lemmy server!

  • db0@lemmy.dbzer0.comOP
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    4
    ·
    1 year ago

    Honestly, I thinking you’re grossly overstating the legal danger a random small lemmy sysadmin is going to get into for running an automated tool like this.

    In any case, you’ve made your point, people can now make their own decisions on whether it’s better to pretend nothing is wrong on their instance, or if they want at least this sort of blanket cleanup. Far be it from me to tell anyone what to do.

    I don’t even know why you think I was recommending for your system to forward the reports to the authorities

    You may not have meant it, but you strongly implied something of the sort. But since this is not what you’re suggesting I’m curious to hear what your optimal approach to those problem would be here.

    • snowe@programming.dev
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      You may not have meant it, but you strongly implied something of the sort. But since this is not what you’re suggesting I’m curious to hear what your optimal approach to those problem would be here.

      Optimal approach is to use the existing systems that are used by massive corporations to solve this problem already. I know everyone on lemmy hates that, but this isn’t something to mess around with. The reason this is optimal is because NCMEC provides the hashes only to these companies. You’re not going to be able to get the hashes (this is a good thing… imagine some child abuser getting access to these hashes and then using them to evade detection). So if you can’t get these hashes (and you shouldn’t want them either) then you should use a service that has them. It is by far the best way to filter and has been proven time and time again to be successful.

      The easiest is CloudFlare’s, and yes, you will have to use them as your DNS which I also understand a vast majority of admins hate. But there are other options as well

      • PhotoDNA
      • Safer
      • Facebook PDQ

      Because access to the original hash databases is considered sensitive, NCMEC will not provide these to smaller platforms. Neither will Microsoft provide the source code of its PhotoDNA algorithm except to its most trusted partners, because if the algorithm became widely known, it is thought that this might enable abusers to bypass it.

      In that article, it actually points out that a solution called Safer that uses machine learning and image recognition has very flawed results and is incredibly biased. So if these massive platforms can’t get this kind of image recognition right then it’s probably best to not waste money and time on it. The article even points out that for smaller platforms it’s not worth it.

      We also know in general terms that machine learning algorithms for image recognition tend to be both flawed overall, and biased against minorities specifically. In October 2020, it was reported that Facebook’s nudity-detection AI reported a picture of onions for takedown. It may be that for largest platforms, AI algorithms can assist human moderators to triage likely-infringing images. But they should never be relied upon without human review, and for smaller platforms they are likely to be more trouble than they are worth

          • db0@lemmy.dbzer0.comOP
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            1 year ago

            Have you already registered for this services and using them on your lemmy? If so the success is something displayed in time.

            • snowe@programming.dev
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              They have been used on millions of websites already. It’s pretty clear that it works. It doesn’t need to be used on lemmy to prove it works. And my application is currently in review so no I haven’t used it. But that really doesn’t matter. Especially if you’re comparing it to a tool written by one person that has been out for a few days.

              • db0@lemmy.dbzer0.comOP
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                1
                ·
                1 year ago

                The situation Has dramatically changed in the the past year. I am telling you but you seem to be in denial. Likewise currently you’re unprotected. As such my previous statement applies: good luck!

                • snowe@programming.dev
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 year ago

                  The situation Has dramatically changed in the the past year. I am telling you but you seem to be in denial.

                  What situation? You haven’t told me anything about anything changing in the last year.

                  Likewise currently you’re unprotected. As such my previous statement applies: good luck!

                  Huh? What previous statement? You’re not protected. You just think you are! You literally claimed that your product has lots of false positives. It most definitely has false negatives too.

                  • db0@lemmy.dbzer0.comOP
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    arrow-down
                    1
                    ·
                    1 year ago

                    The situation is that anyone can ai generate any amount of novel csam now.

                • snowe@programming.dev
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  1 year ago

                  Honestly dude, you do whatever you want. I didn’t want to have this conversation in the first place because I knew you would argue. You wouldn’t build the software in the first place if you thought that the other solutions worked so clearly you hadn’t done your research, including into applicable laws. At this point you’re just fighting to justify having built a pointless tool that can get you in legal trouble. I guarantee that if you talked to a lawyer they would tell you to stop using your own software for this, but clearly you don’t care about that. You built something and you want to justify its existence, so you keep arguing for it and against proven legal solutions.