Skip to content

MSC4113: Image hashes in Policy Lists #4113

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 4 commits into
base: main
Choose a base branch
from

Conversation

MTRNord
Copy link
Contributor

@MTRNord MTRNord commented Feb 24, 2024

Rendered

Potential COIs:

  • I do volunteer work for Draupnir
  • I volunteer at the Matrix foundation for the website
  • I do work for Nordeck

Signed-off-by: Marcel Radzio [email protected]

@MTRNord MTRNord changed the title MSC4111: Image hashes in Policy Lists MSC4113: Image hashes in Policy Lists Feb 24, 2024
being used. There is currently no easy way to have a list of used type strings
across matrix.

An action is hard to define and needs to be discussed as part of the MSC process.
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As mentioned in the MSC I am not sure how to best define actions in the MSC. Suggestions are welcome

@TheArcaneBrony
Copy link

Personal observations and opinions (based on original version):

  1. use a dictionary format for types, so multiple can be specified in a single event (eg. i want to support md4, md5, sha128, sha256, sha384, sha1, sha3, ... file hashes)
  • this also allows you to implement newer formats while keeping backwards compatibility, without having to send 2 million events per policy (/h)
  1. the proposed format only works for images, so calling it "media" is misleading (is an audio file not media? how about a word document or a zip file?)
  2. Perhaps a policy tags list may be useful? This would allow bots to decide an action based on that, eg. csam would be a ban but lewd imagery may not be, depending on the room it's posted in

@turt2live turt2live added proposal A matrix spec change proposal client-server Client-Server API kind:feature MSC for not-core and not-maintenance stuff needs-implementation This MSC does not have a qualifying implementation for the SCT to review. The MSC cannot enter FCP. labels Feb 24, 2024
Comment on lines +7 to +8
The use for these are crowd-gathered hashlists for potentially bad media which
allow people to then scan their media with and also block dangerous media.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This also, unfortunately, creates a list of media that those bad actors will want on their servers. This is what makes this sort of feature difficult, and illegal in many jurisdictions: listing media which may contain CSAM, terrorism, etc is often as illegal as distributing the content itself.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
client-server Client-Server API kind:feature MSC for not-core and not-maintenance stuff needs-implementation This MSC does not have a qualifying implementation for the SCT to review. The MSC cannot enter FCP. proposal A matrix spec change proposal
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants