- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
I posted the other day that you can clean up your object storage from CSAM using my AI-based tool. Many people expressed the wish to use it on their local file storage-based pict-rs. So I’ve just extended its functionality to allow exactly that.
The new lemmy_safety_local_storage.py
will go through your pict-rs volume in the filesystem and scan each image for CSAM, and delete it. The requirements are
- A linux account with read-write access to the volume files
- A private key authentication for that account
As my main instance is using object storage, my testing is limited to my dev instance, and there it all looks OK to me. But do run it with --dry_run
if you’re worried. You can delete lemmy_safety.db
and rerun to enforce the delete after (method to utilize the --dry_run results coming soon)
PS: if you were using the object storage cleanup, that script has been renamed to lemmy_safety_object_storage.py
Why are you such a weirdo where that’s where your mind goes.
Sharing positive hits isn’t saying share the images. It’s saying share the data on who what when where how the hit showed up positive.
Who shared it.
What was it (this is obviously going to be some kind of CSAM given that’s the tool).
When did they share it (time stamps).
Where did they share it (was the same image hit on other runs and what instances did it hit on with the tool).
How did they do it (local sharing, an image hosting service, etc).
You list great points of information that should be shared to admins of other instances. Thanks for clarifying.
In order to get the answers you’re looking for, put out the question “what exactly does this statement mean?” instead of “sounds like this means ___” and waiting for a confirmation/rejection of your assumption.