I noticed a bit of panic around here lately and as I have had to continuously fight against pedos for the past year, I have developed tools to help me detect and prevent this content.

As luck would have it, we recently published one of our anti-csam checker tool as a python library that anyone can use. So I thought I could use this to help lemmy admins feel a bit more safe.

The tool can either go through all your images via your object storage and delete all CSAM, or it canrun continuously and scan and delete all new images as well. Suggested option is to run it using --all once, and then run it as a daemon and leave it running.

Better options would be to be able to retrieve exact images uploaded via lemmy/pict-rs api but we’re not there quite yet.

Let me know if you have any issue or improvements.

EDIT: Just to clarify, you should run this on your desktop PC with a GPU, not on your lemmy server!

  • veroxii@aussie.zone
    link
    fedilink
    English
    arrow-up
    41
    ·
    1 year ago

    This is extremely cool.

    Because of the federated nature of Lemmy many instances might be scanning the same images. I wonder if there might be some way to pool resources that if one instance has already scanned an image some hash of it can be used to identify it and the whole AI model doesn’t need to be rerun.

    Still the issue of how do you trust the cache but maybe there’s some way for a trusted entity to maintain this list?

    • irdc@derp.foo
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      2
      ·
      edit-2
      1 year ago

      How about a federated system for sharing “known safe” image attestations? That way, the trust list is something managed locally by each participating instance.

      Edit: thinking about it some more, a federated image classification system would allow some instances to be more strict than others.

      • gabe [he/him]@literature.cafe
        link
        fedilink
        English
        arrow-up
        7
        ·
        1 year ago

        I think building such a system of some kind that can allow smaller instances to rely from help from larger instances would be extremely awesome.

        Like, lemmy has the potential to lead the fediverse is safety tools if we put the work in.

      • huginn@feddit.it
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        Consensus algorithms. But it means there will always be duplicate work.

        No way around that unfortunately

        • kbotc@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          1 year ago

          Why? Use something like RAFT, elect the leader, have the leader run the AI tool, then exchange results, with each node running it’s own subset of image hashes.

          That does mean you need a trust system, though.

          • irdc@derp.foo
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            As I’m saying, I don’t think you need to: manually subscribing to each trusted instance via ActivityPub should suffice. The pass/fail determination can be done when querying for known images.

          • huginn@feddit.it
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            Yeah that works. Who is the leader and how does it change? Does Lemmy.World take over because it’s largest?

            • kbotc@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              Hash the image, then assign hash ranges to servers that are part of the ring. You’d use RAFT to get consensus about who is responsible for which ranges. I’m largely just envisioning the Scylla gossip replacement as the underlying communications protocol.

    • Starbuck@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      TBH, I wouldn’t be comfortable outsourcing the scanning like that if I were running an instance. It only takes a bit of resources to know that you have done your due diligence. Hopefully this can get optimized to get time to be faster.

    • db0@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      35
      ·
      1 year ago

      It will be atrocious. You can run it, but you’ll likely be waiting for weeks if not months.

    • Rescuer6394@feddit.nl
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 year ago

      the model under the hood is clip interrogator, and it looks like it is just the torch model.

      it will run on cpu, but we can do better, an onnx version of the model will run a lot better on cpu.

      • db0@lemmy.dbzer0.comOP
        link
        fedilink
        English
        arrow-up
        10
        ·
        1 year ago

        sure, or a .cpp. But it will still not be anywhere near as good as a GPU. However it might be sufficient for something just checking new images

        • relic_@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          I’m not really convinced that a GPU backend is needed. Was there ever a comparison of the different CLIP model variants? Or a graph optimized / quantized ONNX version?

          I think the proposed solution makes a lot of sense for the task at hand if it were integrated on the pic-rs end, but it would be worth investigating further improvements if it were on the lemmy server end.

  • Cyborganism@lemmy.ca
    link
    fedilink
    English
    arrow-up
    15
    ·
    1 year ago

    I don’t host a server myself, but can this tool identify the users who posted the images and create a report with their IP addresses?

    This could help identify who spreads that content and it can be used to notify authorities. No?

    • db0@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      16
      ·
      1 year ago

      No but it will record the object storage We then need a way to connect that path to the pict-rs image ID, and once we do that, connect the pict-rs image ID to the comment or post which uploaded it. I don’t know how to do the last two steps however, so hopefully someone else will step up for this

    • db0@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      13
      ·
      1 year ago

      Currently I delete on PIL exceptions. I assume if someone uploaded a .zip to your image storage, you’d want it deleted

      • Starbuck@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 year ago

        The fun part is that it’s still a valid JPEG file if you put more data in it. The file should be fully re-encoded to be sure.

          • Starbuck@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 year ago

            But I could take ‘flower.jpg’, which is an actual flower, and embed a second image, ‘csam.png’ inside it. Your scanner would scan ‘flower.jpg’, find it to be acceptable, then in turn register ‘csam.png’. Not saying that this isn’t a great start, but this is the reason that a lot of websites that allow uploads re-encode images.

  • Dandroid@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    1 year ago

    Thank you for this! Awesome work!

    By the way, this looks easy to put in a container. Have you considered doing that?

      • Dandroid@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        5
        ·
        edit-2
        1 year ago

        I’ll try it out today. I’m about to start my workday, so it will have to be in a few hours. Fingers crossed I can have a PR in about 16 hours from now.

  • sunaurus@lemm.ee
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    1 year ago

    Any thoughts about using this as a middleware between nginx and Lemmy for all image uploads?

    Edit: I guess that wouldn’t work for external images - unless it also ran for all outgoing requests from pict-rs… I think the easiest way to integrate this with pict-rs would be through some upstream changes that would allow pict-rs itself to call this code on every image.

    • db0@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 year ago

      Exactly. If the pict-rs dev allowed us to run an executable on each image before accepting it, it would make things much easier

    • db0@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      You might be able however integrate with my AI Horde endpoint for NSFW checking between nginx and Lemmy.

      https://aihorde.net/api/v2/interrogate/async

      This might allow you to detect NSFW images before they are hosted

      Just send a payload like this

      curl -X 'POST' \
        'https://aihorde.net/api/v2/interrogate/async' \
        -H 'accept: application/json' \
        -H 'apikey: 0000000000' \
        -H 'Client-Agent: unknown:0:unknown' \
        -H 'Content-Type: application/json' \
        -d '{
        "forms": [
          {
            "name": "nsfw"
            }
        ],
        "source_image": "https://lemmy.dbzer0.com/pictrs/image/46c177f0-a7f8-43a3-a67b-7d2e4d696ced.jpeg?format=webp&thumbnail=256"
      }'
      

      Then retrieve the results asynchronously like this

      {
        "state": "done",
        "forms": [
          {
            "form": "nsfw",
            "state": "done",
            "result": {
              "nsfw": false
            }
          }
        ]
      }
      

      or you could just run the nsfw model locally if you don’t have so many uploads.

      if you know a way to pre-process uploads before nginx sends them to lemmy, it might be useful

  • chrisbit@leminal.space
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    1 year ago

    Thanks for releasing this. After doing a --dry_run can the flagged files then be removed without re-analysing all images?

  • snowe@programming.dev
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Hey @db0@lemmy.dbzer0.com, just so you know, this tool is most likely very illegal to use in the USA. Something that your users should be aware of. I don’t really have the energy to go into it now, but I’ll post what I told my users in the programming.dev discord:

    that is almost definitely against the law in the USA. From what I’ve read, you have to follow very specific procedures to report CSAM as well as retain the evidence (yes, you actually have to keep the pictures), until the NCMEC tells you you should destroy the data. I’ve begun the process to sign up programming.dev (yes you actually have to register with the government as an ICS/ESP) and receive a login for reports.

    If you operate a website, and knowingly destroy the evidence without reporting it, you can be jailed. It’s quite strange, and it’s quite a burden on websites. Funnily enough, if you completely ignore your website, so much so that you don’t know that you’re hosting CSAM then you are completely protected and have no obligation to report (in the USA at least)

    Also, that script is likely to get you even more into trouble because you are knowingly transmitting CSAM to ‘other systems’, like dbzer0’s aihorde cluster. that’s pretty dang bad…

    here are some sources:

    • db0@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      1 year ago

      Note that the script I posted is not transmitting the images to the AI Horde.

      Also keep in mind this tool is fully automated and catches a lot of false positives (due to the nature of the scan, it couldn’t be otherwise). So one could argue it’s a generic filtering operation, not an explicit knowledge of CSAM hosting. But IANAL of course.

      This is unlike cloudflare or other services which compare with known CSAM.

      EDIT: That is to mean, if you use this tool to forward these images to the govt, they are going to come after you for spamming them with garbage