Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems (2202.04617v1)

Published 9 Feb 2022 in cs.CR

Abstract: In this paper, we assess existing technical proposals for content moderation in End-to-End Encryption (E2EE) services. First, we explain the various tools in the content moderation toolbox, how they are used, and the different phases of the moderation cycle, including detection of unwanted content. We then lay out a definition of encryption and E2EE, which includes privacy and security guarantees for end-users, before assessing current technical proposals for the detection of unwanted content in E2EE services against those guarantees. We find that technical approaches for user-reporting and meta-data analysis are the most likely to preserve privacy and security guarantees for end-users. Both provide effective tools that can detect significant amounts of different types of problematic content on E2EE services, including abusive and harassing messages, spam, mis- and disinformation, and CSAM, although more research is required to improve these tools and better measure their effectiveness. Conversely, we find that other techniques that purport to facilitate content detection in E2EE systems have the effect of undermining key security guarantees of E2EE systems.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (7)
  1. Seny Kamara (1 paper)
  2. Mallory Knodel (4 papers)
  3. Emma Llansó (2 papers)
  4. Greg Nojeim (1 paper)
  5. Lucy Qin (3 papers)
  6. Dhanaraj Thakur (2 papers)
  7. Caitlin Vogus (1 paper)
Citations (16)

Summary

We haven't generated a summary for this paper yet.