Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

No, it uses perceptual hashing which is inexact, and a fuzzy metric like hamming distance between hashes to determine whether or not two images come from the same source image.

Not only is it entirely possible for two images to have the same perceptual hash, it's even more likely that two unrelated images have similar hashes, which would indicate to the system that one image is likely an edited version of a source image in their database.



It’s possible, but very unlikely. Then of course you need many matches to flag the account. And then of course there’s the manual review. The likelihood that an innocent person would get caught up in this at all is zero.


> It’s possible, but very unlikely.

I have built products in this space. It is entirely likely, and in fact, it is incredibly common. You can look at literally any reverse image search engine's results and see this, because they use the same perceptual hashing techniques to do reverse image lookups.


And you don’t think the threshold for a match will be a lot tighter for this use case compared to an image search engine? And you’re ignoring all the other guards I mentioned? Come on. You may not like Apple, but they’re not stupid.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: