this post was submitted on 31 Aug 2023
368 points (99.5% liked)

Selfhosted

39435 readers
5 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I posted the other day that you can clean up your object storage from CSAM using my AI-based tool. Many people expressed the wish to use it on their local file storage-based pict-rs. So I've just extended its functionality to allow exactly that.

The new lemmy_safety_local_storage.py will go through your pict-rs volume in the filesystem and scan each image for CSAM, and delete it. The requirements are

  • A linux account with read-write access to the volume files
  • A private key authentication for that account

As my main instance is using object storage, my testing is limited to my dev instance, and there it all looks OK to me. But do run it with --dry_run if you're worried. You can delete lemmy_safety.db and rerun to enforce the delete after (method to utilize the --dry_run results coming soon)

PS: if you were using the object storage cleanup, that script has been renamed to lemmy_safety_object_storage.py

top 44 comments
sorted by: hot top controversial new old
[–] [email protected] 67 points 1 year ago* (last edited 1 year ago) (2 children)

I hope people share the positive hits of CSAM and see how widespread the problem is...

DRAMTIC EDIT: the records lemmy_safety_local_storage.py identifies, not the images! @[email protected] seems to think it "sounds like" I am ACTIVELY encouraging the spreading of child pornography images... NO! I mean audit files, such as timestamps, the account that uploaded, etc. Once you have the timestamp, the nginx logs from a lemmy server should help identify the IP address.

[–] [email protected] 31 points 1 year ago (1 children)

What a hilarious mistake haha

[–] [email protected] 28 points 1 year ago* (last edited 1 year ago) (2 children)

It is not even a mistake, it's some pretty mind-fucked up on part of @[email protected] to jump to such a conclusion. crap

[–] [email protected] 11 points 1 year ago

It's cool, most everybody knows what you mean lol. Glad you clarified so there wouldn't be future misunderstandings

[–] [email protected] -1 points 1 year ago (1 children)

Oh come on, its just a correction of communication

[–] [email protected] 3 points 1 year ago (1 children)

It’s probably projection. Nobody reasonable would have jumped to the same conclusion. It doesn’t even remotely read like that.

[–] [email protected] 2 points 1 year ago (1 children)

It sounds to me like an NT desire for perfectly crafted arguments, without ambiguity. I do this, and feel fortunate that I didnt call for a correction, myself. See how vicious you all are about it.

[–] [email protected] 1 points 1 year ago (1 children)

Oh come on. Being ND doesn’t mean your mind jumps to sharing child porn. That’s a fuckin cop out.

[–] [email protected] 3 points 1 year ago

You are saying the mind jumps, but that is the topic. I meant to say that being ND can create a desire for clarity in communication. A direct or terse argument.

[–] [email protected] 24 points 1 year ago

We Evolve!

There something really satisfying about witnessing a community starting to talk about serious a issue and days later see things already improved.

Lemmy is now the internet, glory to all volunteer devs. Lets make it the best place we possibly can!

[–] [email protected] 20 points 1 year ago (2 children)

I'm curious... How does one even test such a thing before distributing it without having offending files to test against.

Like during the development process of this project, how on earth can you test it properly? 😂

[–] [email protected] 18 points 1 year ago (1 children)

it uses a model that describes a photo, then it searches the generated description for some terms and ranks the image to some levels of safety.

to test it you use a more general filter, for all nsfw for example, and see if the matches are correct.

[–] [email protected] 9 points 1 year ago (1 children)

Hmm, thinking out loud... Wouldn't that also make it easy to remove scat porn and Hitler + Nazi flag images?

There has been a lot of spam like that on Lemmy and at least the latter is somewhat illegal to host in Germany as well.

[–] [email protected] 7 points 1 year ago

yes... maybe.

as the dev said, it flags a lot of false positive. so a human should look at them anyway.

maybe when this is a bit more evolved, we can use it to preprocess posts, and if a post gets flagged for something, a mod / admin needs to approve the post manually.

maybe for CASM, it gets sent to an external service specialized to that stuff, so the mod / admin doesn't have to look at the images.

[–] [email protected] 3 points 1 year ago

While it's not the case for this project I'm sure there's some poor researcher our there who trained a model on actual confiscated CSAM. Or most likely overworked traumatized thirld world content moderators employed by the likes of Meta.

[–] [email protected] 13 points 1 year ago* (last edited 1 year ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
IP Internet Protocol
SSH Secure Shell for remote terminal access
nginx Popular HTTP server

3 acronyms in this thread; the most compressed thread commented on today has 8 acronyms.

[Thread #93 for this sub, first seen 31st Aug 2023, 04:15] [FAQ] [Full list] [Contact] [Source code]

[–] [email protected] 12 points 1 year ago

This is fantastic work to an immediate problem. Thank you.

There is something amazing about someone just sharing a solution like this without expectation of anything back, and even if this isn't the best right solution, it contributes to the global commons, and improves society.

[–] [email protected] 11 points 1 year ago (1 children)

It's great that there's now a tool, but this kind of issue is why I'm not considering self-hosting a fediverse service: due to the nature of the beast even a single-user instance effectively becomes a publicly accessible distributor of content that others created/uploaded. I'm sure this could be restricted somewhat (by making the web UI inaccessible for the public), but the federation means that other instances need to be able to get content from the server. That's way to much legal risk for me.

[–] [email protected] 13 points 1 year ago (1 children)

Actually the other instances don't pull content. You push it out instead. Basically if you don't run pict-rs and you don't allow user registreations, you're safe for everything except potential copyright infringement from some text someone might post. If you make your webui inaccessible to anyone but your IP, you protect against even that.

[–] [email protected] 3 points 1 year ago (1 children)

what stops other instances from pushing bad stuff to you? even if someone I follow posts illegal stuff, it'll end up on my server.

[–] [email protected] 3 points 1 year ago

If you don't run pictrs, they literally cannot push images to you as you can't store them

[–] [email protected] 5 points 1 year ago

seems like clip-interrogator isn't explicitly supported on apple silicon, I'll give it a try later

thanks for making this!

[–] [email protected] 5 points 1 year ago (1 children)

Thanks for adding this. I guess I now have my weekend planned for moving Pict-rs to a server with a fast enough GPU and try this out 🤔

[–] [email protected] 7 points 1 year ago (1 children)

You don't need to move pict-rs to a GPU server. In fact that would be prohibitedly expensive long-term. I suggest you just use your PC to run this against your current pict-rs server, or just rent a GPU server for this time.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago) (1 children)

I have a server with a smaller Nvidia GPU available. I hope the 3GB vRAM it has will be sufficient.

[–] [email protected] 4 points 1 year ago (1 children)

OK, but just to point out that the script hasn't been setup to run locally yet. Just through ssh. Making it look for the files locally is my next to-do

[–] [email protected] 4 points 1 year ago (1 children)

Ah, I was already wondering why it would need SSH keys to scan local files 😅 Well, I only have time to look into this on Sunday I think, so no rush.

[–] [email protected] 1 points 1 year ago (1 children)

You could always SSH into localhost I assume.

[–] [email protected] 1 points 1 year ago (1 children)

Yes that would work, but it's a bit unnecessary

[–] [email protected] 1 points 1 year ago

Yeah, just meant it should be a valid workaround in the event they want to try it before your local scan feature is ready.

[–] [email protected] 3 points 1 year ago* (last edited 1 year ago) (1 children)

Is there a reason it needs a PK vs just being able to point it at a local folder and running as a user with write access?

[–] [email protected] 7 points 1 year ago

Most lemmy servers do not have a GPU, so that would make it too slow. But I plan to provide this option soon if people want it.

[–] [email protected] 3 points 1 year ago

Something that might be useful long term is trying to train an AI and release weights to identify CSAM that admins can use to check images. The main problem is finding a way to do this without storing those kinds of images or video :/

My understanding is that right now, the main mechanisms involved use several central databases which use perceptual hashes of known CSAM material. The problem is that this ends up being a whackamole solution, and at least in theory governments could use these databases to censor copyrighted or more general "unapproved" content, though i imagine such a db would lose trust quickly and I'm not aware of this being an issue in practise.

One potential solution is "opportunistic training" where, when new CSAM material gets identified and submitted to the FBI or these databases by various server admins, a small amount of training is done on the AI weights before the image or video is deleted and only a perceptual hash remains. Furthermore, if a picture is reported as "known CSAM" by these dbs, then you do the same thing with that image before it gets deleted.

To avoid false positives, you also train the AI on general non-CSAM content.

Ideally this process would be fully automated so no-one has to look at that shit - over time, ypu'd theoretically get a neural net capable of identifying CSAM reliably with few or no false positives or false negatives ^.^. Admins could also try for some kind of distributed training, where each contributes weight deltas from local training, or each builds up LoRA-style improvement modules and people combine them to reduce bandwidth for modification sharing.