OK…


Tin Eye is for image recognition, not video and it’s more concerned with 
duplication…

>From a quick read of their site, it doesn’t appear to be a neural network or 
>AI…

Did you bother reading my last post about scalability?

Even if you used an algorithm like NSFW, it will scan one image every 30 
seconds…

So at 25fps, that’s 749 images that could contain something potentially “nasty”…

Your argument is so flawed that it’s dangerous, especially given the Luddites 
currently in power…

Again, who is going to pay for the development of said “fingerprinting” and 
infrastructure?

The government? They screamed “financial crisis” and now 6 years later the debt 
has tripled…

They have based their PROJECTIONS of a surplus on the volatile commodities 
market…



What could possibly go wrong?



Andy









From: AusNOG <ausnog-boun...@lists.ausnog.net> On Behalf Of Paul Wilkins
Sent: Wednesday, 10 April 2019 11:17 AM
To: ausnog@lists.ausnog.net
Subject: Re: [AusNOG] More legislative interventions



https://tineye.com/search/f274c3b49edcca9a6d83994a43629445a5ea5a23/



On Wed, 10 Apr 2019 at 11:12, Matt Palmer <mpal...@hezmatt.org 
<mailto:mpal...@hezmatt.org> > wrote:

On Wed, Apr 10, 2019 at 10:56:12AM +1000, Paul Wilkins wrote:
> Now I would say that for instance, if the eSecurity Director posts the CRC
> of a file as being "abhorrent violent" content, and your company doesn't
> expeditiously take down that material, expect problems down the pike. I
> doubt a CRC check alone is sufficient.

Given that a CRC changes if you modify any bit of the file, and common CRC
implementations have a space of either 16 or 32 bits (65,536 and ~4 billion
possible values, respectively), "insufficient" doesn't even begin to
describe such a scheme.

> I'd say a fingerprinting system to
> match altered copies of the subject file should be implemented.

Once again with this magical "figerprinting" scheme.  Nothing like what
you're describing actually exists.  Further, there's no point in each
company coming up with their own scheme for calculating this magical
fingerprint, because if the eSecurity Director wants to say "take down
everything like this fingerprint" they have to use the *same* scheme to come
up with the same fingerprint.

> It doesn't have to work in all cases.

It won't work in *any* case.

> I am not a lawyer. This is not expert advice.

Yes, I think that is quite evident.

- Matt

_______________________________________________
AusNOG mailing list
AusNOG@lists.ausnog.net <mailto:AusNOG@lists.ausnog.net>
http://lists.ausnog.net/mailman/listinfo/ausnog



---
This email has been checked for viruses by AVG.
https://www.avg.com
_______________________________________________
AusNOG mailing list
AusNOG@lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog

Reply via email to