Hacker News new | past | comments | ask | show | jobs | submit login

> Demand the original intended file for the hash?

Even if they'd provide it-- the attacker need only perturb an image from an existing child abuse image database until it matches the target images.

Step 1. Find images associated with the race or political ideology that you would like to genocide and compute their perceptual hashes.

Step 2. Obtain a database of old widely circulated child porn. (Easy if you're a state actor, you already have it, otherwise presumably it's obtainable since if it wasn't none of this scanning would be needed).

Step 3. Scan for the nearest perceptual matches for the target images in the CP database. Then perturb the child porn images until they match (e.g. using adversarial noise).

Step 4. Put the modified child porn images into circulation.

Step 5. When these in-circulation images are added to the database the addition is entirely plausibly denyable.

Step 6. After rounding up the targets, even if they're allowed any due process at all you disallow them access to the images. If that dis-allowance fails, you can still cover by the images existing and their addition having been performed by someone totally ignorant of the scheme.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: