all InfoSec news
Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems. (arXiv:2202.04617v1 [cs.CR])
Feb. 10, 2022, 2:20 a.m. | Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus
cs.CR updates on arXiv.org arxiv.org
In this paper, we assess existing technical proposals for content moderation
in End-to-End Encryption (E2EE) services. First, we explain the various tools
in the content moderation toolbox, how they are used, and the different phases
of the moderation cycle, including detection of unwanted content. We then lay
out a definition of encryption and E2EE, which includes privacy and security
guarantees for end-users, before assessing current technical proposals for the
detection of unwanted content in E2EE services against those guarantees.
We …
content moderation encrypted end end-to-end moderation systems
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Systems Security Officer (ISSO) (Remote within HR Virginia area)
@ OneZero Solutions | Portsmouth, VA, USA
Security Analyst
@ UNDP | Tripoli (LBY), Libya
Senior Incident Response Consultant
@ Google | United Kingdom
Product Manager II, Threat Intelligence, Google Cloud
@ Google | Austin, TX, USA; Reston, VA, USA
Cloud Security Analyst
@ Cloud Peritus | Bengaluru, India