Feb. 10, 2022, 2:20 a.m. | Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus

cs.CR updates on arXiv.org arxiv.org

In this paper, we assess existing technical proposals for content moderation
in End-to-End Encryption (E2EE) services. First, we explain the various tools
in the content moderation toolbox, how they are used, and the different phases
of the moderation cycle, including detection of unwanted content. We then lay
out a definition of encryption and E2EE, which includes privacy and security
guarantees for end-users, before assessing current technical proposals for the
detection of unwanted content in E2EE services against those guarantees.


We …

content moderation encrypted end end-to-end moderation systems

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Systems Security Officer (ISSO) (Remote within HR Virginia area)

@ OneZero Solutions | Portsmouth, VA, USA

Security Analyst

@ UNDP | Tripoli (LBY), Libya

Senior Incident Response Consultant

@ Google | United Kingdom

Product Manager II, Threat Intelligence, Google Cloud

@ Google | Austin, TX, USA; Reston, VA, USA

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India