Closed Chiiruno closed 5 years ago
Also has the benefit of cleaning images gucas upload.
Sounds good, should be easy enough to do, I'll see what I can do tomorrow.
I already assigned myself to it.
Yeah, just as I finished my comment, oh well.
Doesn't really rule out stenography as anon mentions, but not much we can do about that.
Well, image secret posting using the script is literally just plaintext at the end of file, and I dont think the people making the script would ever do anything more complicated than that. So its not really a problem.
Make it an auto ban too. Anyone who changes the original image hash (and thus lose tag mappings) deserves death.
There is still the problem of stolen images
No need for auto-ban, since server can just scrub it. Stenography will be hard, if not impossible to detect though.
people making the script would ever do anything more complicated than that
I'm tempted to do that for the userscript, for shits and giggles.
Chiiru no!
They can just simply change the format to bypass the server scrubbing. Don't even need steganography.
That's a good point. Any thoughts on a more wide sweep to detect and scrub sekritposts in the image, and hopefully return the hash back to normal?
I'm not familiar with image formats, but maybe there's some header information you can use to determine where the file should end, and compare that to where it actually ends. Worst case scenario, you could try parsing the file like a decoder would, and compare the expected end to the actual end. But that's a lot of work and probably not worth it.
Well, the userscript adds plaintext at the end of the file like @RMiko said, here's two examples from two files. (in plaintext)
note the 004 and 005, that seems to be an indicator along with the "secret" plaintext. I'll have to look into the actual userscript and how it works, though.
The "secret" plaintext is just a magic to identify that the image contains sekrittext. The 3 digits before "secret" is the length of the sekrittext. And the text before the digits is the actual sekrittext.
Right now, a quick fix would be to just quickly identify the magic, and if it exists, check if there's a number inbetween 000 and 999 and remove all of that along with whatever the number of characters before it is as indicated by the number.
To make this server performant, I'll just check the first ~50 characters of the beginning and end of the file right now.
of the beginning
I don't think there's much point in that.
Minimal overhead to prevent simply changing the position to the (easily detectable by userscript) beginning of the image.
I'm pretty sure putting it at the beginning would break the image. The end is the only place they can put it without breaking it.
Alright, fair enough.
I'm pretty sure putting it at the beginning would break the image. The end is the only place they can put it without breaking it. Or in the meta information.
On Thu, 25 Apr 2019, 02:11 チルノ, notifications@github.com wrote:
Alright, fair enough.
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/bakape/meguca/issues/1050#issuecomment-486460639, or mute the thread https://github.com/notifications/unsubscribe-auth/AB347MA7NH6GJMRFXW4DK5TPSDSJRANCNFSM4HIIJJPA .
I actually like image sekritposting, but instead of retarded autism wars, let's just scrub it on upload receive.