<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=utf-8"><meta name=Generator content="Microsoft Word 15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.msonormal0, li.msonormal0, div.msonormal0
        {mso-style-name:msonormal;
        mso-margin-top-alt:auto;
        margin-right:0cm;
        mso-margin-bottom-alt:auto;
        margin-left:0cm;
        font-size:11.0pt;
        font-family:"Calibri",sans-serif;}
span.EmailStyle18
        {mso-style-type:personal-reply;
        font-family:"Calibri",sans-serif;
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;
        font-family:"Calibri",sans-serif;
        mso-fareast-language:EN-US;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-AU link=blue vlink=purple><div class=WordSection1><p class=MsoNormal><span style='mso-fareast-language:EN-US'>OK…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>Tin Eye is for image recognition, not video and it’s more concerned with duplication…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>From a quick read of their site, it doesn’t appear to be a neural network or AI…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>Did you bother reading my last post about scalability?<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>Even if you used an algorithm like NSFW, it will scan one image every 30 seconds…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>So at 25fps, that’s 749 images that could contain something potentially “nasty”…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>Your argument is so flawed that it’s dangerous, especially given the Luddites currently in power…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>Again, who is going to pay for the development of said “fingerprinting” and infrastructure?<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>The government? They screamed “financial crisis” and now 6 years later the debt has tripled…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>They have based their PROJECTIONS of a surplus on the volatile commodities market…<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>What could possibly go wrong?<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'>Andy<o:p></o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><span style='mso-fareast-language:EN-US'><o:p> </o:p></span></p><p class=MsoNormal><b><span lang=EN-US>From:</span></b><span lang=EN-US> AusNOG <ausnog-bounces@lists.ausnog.net> <b>On Behalf Of </b>Paul Wilkins<br><b>Sent:</b> Wednesday, 10 April 2019 11:17 AM<br><b>To:</b> ausnog@lists.ausnog.net<br><b>Subject:</b> Re: [AusNOG] More legislative interventions<o:p></o:p></span></p><p class=MsoNormal><o:p> </o:p></p><div><div><p class=MsoNormal><a href="https://tineye.com/search/f274c3b49edcca9a6d83994a43629445a5ea5a23/">https://tineye.com/search/f274c3b49edcca9a6d83994a43629445a5ea5a23/</a><o:p></o:p></p></div></div><p class=MsoNormal><o:p> </o:p></p><div><div><p class=MsoNormal>On Wed, 10 Apr 2019 at 11:12, Matt Palmer <<a href="mailto:mpalmer@hezmatt.org">mpalmer@hezmatt.org</a>> wrote:<o:p></o:p></p></div><blockquote style='border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5.0pt'><p class=MsoNormal>On Wed, Apr 10, 2019 at 10:56:12AM +1000, Paul Wilkins wrote:<br>> Now I would say that for instance, if the eSecurity Director posts the CRC<br>> of a file as being "abhorrent violent" content, and your company doesn't<br>> expeditiously take down that material, expect problems down the pike. I<br>> doubt a CRC check alone is sufficient.<br><br>Given that a CRC changes if you modify any bit of the file, and common CRC<br>implementations have a space of either 16 or 32 bits (65,536 and ~4 billion<br>possible values, respectively), "insufficient" doesn't even begin to<br>describe such a scheme.<br><br>> I'd say a fingerprinting system to<br>> match altered copies of the subject file should be implemented.<br><br>Once again with this magical "figerprinting" scheme.  Nothing like what<br>you're describing actually exists.  Further, there's no point in each<br>company coming up with their own scheme for calculating this magical<br>fingerprint, because if the eSecurity Director wants to say "take down<br>everything like this fingerprint" they have to use the *same* scheme to come<br>up with the same fingerprint.<br><br>> It doesn't have to work in all cases.<br><br>It won't work in *any* case.<br><br>> I am not a lawyer. This is not expert advice.<br><br>Yes, I think that is quite evident.<br><br>- Matt<br><br>_______________________________________________<br>AusNOG mailing list<br><a href="mailto:AusNOG@lists.ausnog.net" target="_blank">AusNOG@lists.ausnog.net</a><br><a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><o:p></o:p></p></blockquote></div></div><div id="DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2"><br />
<table style="border-top: 1px solid #D3D4DE;">
        <tr>
        <td style="width: 55px; padding-top: 13px;"><a href="http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient" target="_blank"><img src="https://ipmcdn.avast.com/images/icons/icon-envelope-tick-green-avg-v1.png" alt=""  width="46" height="29" style="width: 46px; height: 29px;" /></a></td>
                <td style="width: 470px; padding-top: 12px; color: #41424e; font-size: 13px; font-family: Arial, Helvetica, sans-serif; line-height: 18px;">Virus-free. <a href="http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient" target="_blank" style="color: #4453ea;">www.avg.com</a>
                </td>
        </tr>
</table><a href="#DAB4FAD8-2DD7-40BB-A1B8-4E2AA1F9FDF2" width="1" height="1"> </a></div></body></html>