• Hector@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    2
    ·
    4 hours ago

    So anyone care to expound on this?

    I know hash marks are a one way communication video games made you use to combat pirating. I do not think they should be allowed to force you to do such things for video game unlocking but I am sure they have gotten worse not better.

    • krunklom@lemmy.zip
      link
      fedilink
      English
      arrow-up
      4
      ·
      2 hours ago

      With the caveat that I haven’t read how google is implementing this I can provide some high level context on how hashes work from a security perspective.

      Anyone else feel free to correct anything I get wrong here.

      So, once upon a time someone came up with something called md5 for encrypting things. This didn’t end up being a very effective way of encrypting files, but people did find that encrypting files this way was a great way to predictably create a value that would be unique to that specific file.

      So if you take an md5 hash of a .txt files with “goat testicles” in it, called goats.txt, and someone sends you a file called goats.txt, you should be able to take an md5 hash of the file before opening it, and if they match up they’re the same file. If someone adds a “z” to the end of goats.txt the md5 hash will change so you’ll know it’s not the same file.

  • AbouBenAdhem@lemmy.world
    link
    fedilink
    English
    arrow-up
    50
    arrow-down
    2
    ·
    edit-2
    15 hours ago

    First I’ve heard of StopNCII… what’s to stop it from being abused to remove (say) images of police brutality or anything else states or “participating companies” don’t want to be seen?

      • FreedomAdvocate@lemmy.net.au
        link
        fedilink
        English
        arrow-up
        5
        ·
        3 hours ago

        You guys are all acting like this “technology” is new lol. It’s the exact same way that all of the big companies detect CSAM - they have databases of hashes of known CSAM images, and every time you upload a file to their servers they hash your image and compare it to their database. If your uploads get a few matches, they flag your account for manual investigation.

        All this is doing is applying the same process for other types of images - non consensual intimate images, or “revenge porn” as it’s more commonly known.

        CSAM has systems in place to prevent abuse in the way you mention, as it uses databases managed by separate companies all over the world, and it has to match on multiple databases precisely to stop it from being abused that way. I would assume this is the same.