Niv Sardi commited on
Commit
d16b094
1 Parent(s): eada63e

README: update todo

Browse files

Signed-off-by: Niv Sardi <xaiki@evilgiggle.com>

Files changed (1) hide show
  1. README.org +7 -7
README.org CHANGED
@@ -4,15 +4,15 @@ Detect spoofed website by detecting logos from bank and financial entities in
4
  pages with =ssl certificates= that do not match.
5
 
6
  The process is pretty simple:
7
- - scrape gvt websites to get a list of entities (for argentina it's BCRA)
8
- - get logos, names and url
9
- - navigate the url, extract the ssl certificate and look for =img= and tags
10
  with =id= or =class= logo (needs more heuristics) to make a db of logos
11
- - screenshot the page and slice it into tiles generating YOLO annotations for
12
  the detected logos
13
- - augment data using the logos database and the logoless tiles as background images
14
- - train yolov5s
15
- - feed everything to a web extension that will detect the logos in any page
16
  and show a warning if the =SSL certificate= mismatches the collected one.
17
 
18
  * running
 
4
  pages with =ssl certificates= that do not match.
5
 
6
  The process is pretty simple:
7
+ - [/] scrape gvt websites to get a list of entities (for argentina it's BCRA)
8
+ - [/] get logos, names and url
9
+ - [/] navigate the url, extract the ssl certificate and look for =img= and tags
10
  with =id= or =class= logo (needs more heuristics) to make a db of logos
11
+ - [/] screenshot the page and slice it into tiles generating YOLO annotations for
12
  the detected logos
13
+ - [ ] augment data using the logos database and the logoless tiles as background images
14
+ - [ ] train yolov5s
15
+ - [ ] feed everything to a web extension that will detect the logos in any page
16
  and show a warning if the =SSL certificate= mismatches the collected one.
17
 
18
  * running