Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

An analysis of photodna

M Steinebach - Proceedings of the 18th International Conference on …, 2023 - dl.acm.org
PhotoDNA is a popular hash used to combat CSAM. So far, only limited information has
been provided about this hash in terms of its performance. In this paper, we provide an …

End-to-End Secure Messaging with Traceability Only for Illegal Content

J Bartusek, S Garg, A Jain, GV Policharla - … International Conference on …, 2023 - Springer
As end-to-end encrypted messaging services become widely adopted, law enforcement
agencies have increasingly expressed concern that such services interfere with their ability …

Public verification for private hash matching

S Scheffler, A Kulshrestha… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
End-to-end encryption (E2EE) prevents online services from accessing user content. This
important security property is also an obstacle for content moderation methods that involve …

[HTML][HTML] Hamming distributions of popular perceptual hashing techniques

S McKeown, WJ Buchanan - Forensic Science International: Digital …, 2023 - Elsevier
Content-based file matching has been widely deployed for decades, largely for the detection
of sources of copyright infringement, extremist materials, and abusive sexual media …

Thoughts on child safety on commodity platforms

I Levy, C Robinson - arXiv preprint arXiv:2207.09506, 2022 - arxiv.org
The explosion of global social media and online communication platforms has changed how
we interact with each other and as a society, bringing with it new security and privacy …

Putting the Count Back Into Accountability: An Audit of Social Media Transparency Disclosures, Focusing on Sexual Exploitation of Minors

R Grimm - arXiv preprint arXiv:2402.14625, 2024 - arxiv.org
This paper explores a lightweight, quantitative audit methodology for transparency
disclosures called scrappy audits. It amounts to little more than treating redundant and …

Distance distributions and runtime analysis of perceptual hashing algorithms

S Sharma - Journal of Visual Communication and Image …, 2024 - Elsevier
Perceptual image hashing refers to a class of algorithms that produce content-based image
hashes. These systems use specialized perceptual hash algorithms like Phash, Microsoft's …

[PDF][PDF] Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning

A Hooda, A Labunets, T Kohno, E Fernandes - NDSS, 2024 - ndss-symposium.org
Content scanning systems employ perceptual hashing algorithms to scan user content for
illicit material, such as child pornography or terrorist recruitment flyers. Perceptual hashing …

Re-Purposing Perceptual Hashing Based Client Side Scanning for Physical Surveillance

A Hooda, A Labunets, T Kohno… - arXiv preprint arXiv …, 2022 - arxiv.org
Content scanning systems employ perceptual hashing algorithms to scan user content for
illegal material, such as child pornography or terrorist recruitment flyers. Perceptual hashing …