Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
102 tokens/sec
GPT-4o
59 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
50 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

"Is Reporting Worth the Sacrifice of Revealing What I Have Sent?": Privacy Considerations When Reporting on End-to-End Encrypted Platforms (2306.10478v1)

Published 18 Jun 2023 in cs.HC

Abstract: User reporting is an essential component of content moderation on many online platforms -- in particular, on end-to-end encrypted (E2EE) messaging platforms where platform operators cannot proactively inspect message contents. However, users' privacy concerns when considering reporting may impede the effectiveness of this strategy in regulating online harassment. In this paper, we conduct interviews with 16 users of E2EE platforms to understand users' mental models of how reporting works and their resultant privacy concerns and considerations surrounding reporting. We find that users expect platforms to store rich longitudinal reporting datasets, recognizing both their promise for better abuse mitigation and the privacy risk that platforms may exploit or fail to protect them. We also find that users have preconceptions about the respective capabilities and risks of moderators at the platform versus community level -- for instance, users trust platform moderators more to not abuse their power but think community moderators have more time to attend to reports. These considerations, along with perceived effectiveness of reporting and how to provide sufficient evidence while maintaining privacy, shape how users decide whether, to whom, and how much to report. We conclude with design implications for a more privacy-preserving reporting system on E2EE messaging platforms.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (65)
  1. Bugs in our pockets: The risks of client-side scanning. arXiv preprint arXiv:2110.07450, 2021.
  2. The security blanket of the chat world: An analytic evaluation and a user study of telegram. In 2nd European Workshop on Usable Security. Internet Society, 2017.
  3. Exploring user mental models of {{\{{End-to-End}}\}} encrypted communication tools. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), 2018.
  4. Obstacles to the adoption of secure communication tools. In 2017 IEEE Symposium on Security and Privacy (SP), pages 137–153. IEEE, 2017.
  5. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce, pages 1–8, 1999.
  6. Adrian Chen. The laborers who keep dick pics and beheadings out of your facebook feed. "https://www.wired.com/2014/10/content-moderation/", 2014. [Online; accessed 18-Jan-2023].
  7. Designing cyberbullying mitigation and prevention solutions through participatory design with teenagers. In Proceedings of the 2016 CHI conference on human factors in computing systems, pages 3895–3905, 2016.
  8. Leading johnny to water: Designing for usability and trust. In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, pages 69–88, 2015.
  9. Child-welfare activists attack facebook over encryption plans. The New York Times, 2022.
  10. Monika Bickert. Publishing our internal enforcement guidelines and expanding our appeals process, April 2018.
  11. Industrial practitioners’ mental models of adversarial machine learning. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), pages 97–116, 2022.
  12. Stfu noob! predicting crowdsourced decisions on toxic behavior in online games. In Proceedings of the 23rd international conference on World wide web, pages 877–888, 2014.
  13. Thematic analysis. In Pranee Liamputtong, editor, Handbook of Research Methods in Health Social Sciences, pages 843–860. Springer Singapore, Singapore, 2019.
  14. Facebook Help Center. End-to-end encryption.
  15. Pew Research Center. Nearly half of those who have been harassed online know their harasser, 2017.
  16. Pew Research Center. The state of online harassment, 2021.
  17. Crossmod: A Cross-Community Learning-based System to Assist Reddit Moderators. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW):1–30, nov 2019.
  18. Anyone can become a troll: Causes of trolling behavior in online discussions. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing, pages 1217–1230, 2017.
  19. What is a flag for? social media reporting tools and the vocabulary of complaint. New Media & Society, 18(3):410–428, 2016.
  20. " i need a better description": An investigation into user expectations for differential privacy. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pages 3037–3052, 2021.
  21. Expert and {{\{{Non-Expert}}\}} attitudes towards (secure) instant messaging. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), pages 147–157, 2016.
  22. Privacy calculus model in e-commerce–a study of italy and the united states. European Journal of Information Systems, 15(4):389–402, 2006.
  23. An extended privacy calculus model for e-commerce transactions. Information systems research, 17(1):61–80, 2006.
  24. Discord. What is discord. https://discord.com/safety/360044149331-what-is-discord. [Online; accessed 28-Jan-2023].
  25. Discord. Best practices for reporting tools, 2022. [Online; accessed 28-Jan-2023].
  26. Fast message franking: From invisible salamanders to encryptment. In Annual International Cryptology Conference, pages 155–186. Springer, 2018.
  27. Facebook. Facebook: Messenger secret conversations technical whitepaper, 2017.
  28. Helping johnny 2.0 to encrypt his facebook conversations. In Proceedings of the eighth symposium on usable privacy and security, pages 1–17, 2012.
  29. To catch a ratter: Monitoring the behavior of amateur darkcomet rat operators in the wild. In 2017 IEEE symposium on security and privacy (SP), pages 770–787. Ieee, 2017.
  30. Finally johnny can encrypt: But does this make him feel more secure? In Proceedings of the 13th International Conference on Availability, Reliability and Security, pages 1–10, 2018.
  31. Sarah A Gilbert. Towards intersectional moderation: An alternative model of moderation built on care and power. arXiv preprint arXiv:2305.11250, 2023.
  32. Google. Youtube community guidelines enforcement in google’s tranparency report for 2018., 2018.
  33. Yes: Affirmative consent as a theoretical framework for understanding and imagining social platforms. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–18, 2021.
  34. Adrianne Jeffries. Meet ’swatting,’ the dangerous prank that could get someone killed, 2013. [Online; accessed 28-Jan-2023].
  35. Outside looking in: Approaches to content moderation in end-to-end encrypted systems. arXiv preprint arXiv:2202.04617, 2022.
  36. {{\{{“My}}\}} data just goes {{\{{Everywhere:”}}\}} user mental models of the internet and implications for privacy and security. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), pages 39–52, 2015.
  37. " when i am on wi-fi, i am fearless" privacy concerns & practices in eeryday wi-fi use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1993–2002, 2009.
  38. Flag and flaggability in automated moderation: The case of reporting toxic behavior in an online game community. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, pages 1–12, 2021.
  39. " if https were secure, i wouldn’t need 2fa"-end user and administrator mental models of https. In 2019 IEEE Symposium on Security and Privacy (SP), pages 246–263. IEEE, 2019.
  40. Slash (dot) and burn: distributed moderation in a large online conversation space. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 543–550, 2004.
  41. Anti-Defamation League. Online hate and harassment: The american experience 2022, 2022.
  42. Nonconsensual image sharing: one in 25 americans has been a victim of "revenge porn", 2016.
  43. Confidante: Usable encrypted email: A case study with lawyers and journalists. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pages 385–400. IEEE, 2017.
  44. Understanding situational online information disclosure as a privacy calculus. Journal of Computer Information Systems, 51(1):62–71, 2010.
  45. Squadbox: A tool to combat email harassment using friendsourced moderation. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 1–13, 2018.
  46. Networked privacy: How teenagers negotiate context in social media. New media & society, 16(7):1051–1067, 2014.
  47. Reporting, reviewing, and responding to harassment on twitter. arXiv preprint arXiv:1505.03359, 2015.
  48. Matrix. Introduction to matrix. https://matrix.org/docs/guides/introduction. [Online; accessed 28-Jan-2023].
  49. Matrix. Moderation in matrix. https://matrix.org/docs/guides/moderation#reporting-bad-content, 2022. [Online; accessed 28-Jan-2023].
  50. Investigating the computer security practices and needs of journalists. In 24th USENIX Security Symposium (USENIX Security 15), pages 399–414, 2015.
  51. Information sensitivity typology: Mapping the degree and type of risk consumers perceive in personal data sharing. Journal of Consumer Affairs, 51(1):133–161, 2017.
  52. Poster: Mental models-user understanding of messaging and encryption. In Proceedings of European Symposium on Security and Privacy. http://www. ieee-security. org/TC/EuroSP2016/posters/number18. pdf, 2016.
  53. Riana Pfefferkorn. Content-oblivious trust and safety techniques: Results from a survey of online service providers. Journal of Online Trust and Safety, 1(2), 2022.
  54. Sarah T Roberts. Commercial content moderation: Digital laborers’ dirty work. In The Intersectional Internet: Race, Sex, Class and Culture Online. Peter Lang Publishing, 2016.
  55. When signal hits the fan: On the usability and security of state-of-the-art secure mobile messaging. In European Workshop on Usable Security. IEEE, pages 1–7, 2016.
  56. ‘it’sa giant faux pas’: exploring young trans people’s beliefs about deadnaming and the term deadname. Journal of LGBT Youth, pages 1–20, 2022.
  57. Slack. Join a slack workspace. https://slack.com/help/articles/212675257-Join-a-Slack-workspace. [Online; accessed 28-Jan-2023].
  58. Fifteen minutes of unwanted fame: Detecting and characterizing doxing. In proceedings of the 2017 Internet Measurement Conference, pages 432–444, 2017.
  59. Sok: Hate, harassment, and the changing landscape of online abuse. In 2021 IEEE Symposium on Security and Privacy (SP), pages 247–267. IEEE, 2021.
  60. Asymmetric message franking: Content moderation for metadata-private end-to-end encryption. In Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III 39, pages 222–250. Springer, 2019.
  61. Help, i am losing control! examining the reporting of sexual harassment by adolescents to social networking sites. Cyberpsychology, Behavior, and Social Networking, 19(1):16–22, 2016.
  62. Directions in abusive language training data, a systematic review: Garbage in, garbage out. Plos one, 15(12):e0243300, 2020.
  63. WhatsApp. Communities now available! "https://blog.whatsapp.com/communities-now-available", 2022. Online; accessed 28-Jan-2023.
  64. WhatsApp. How to block and report contacts. "https://faq.whatsapp.com/1142481766359885/?cms_platform=android", 2022. Online; accessed 28-Jan-2023.
  65. Let’s report our rivals: how chinese fandoms game content moderation to restrain opposing voices. Journal of Quantitative Description: Digital Media, 3, 2023.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (5)
  1. Leijie Wang (12 papers)
  2. Ruotong Wang (20 papers)
  3. Sterling Williams-Ceci (2 papers)
  4. Sanketh Menda (4 papers)
  5. Amy X. Zhang (58 papers)
Citations (2)