Aug. 25, 2022, 1:20 a.m. | Chaitanya Rahalkar, Anushka Virgaonkar

cs.CR updates on arXiv.org arxiv.org

This paper aims to survey various techniques utilized for content moderation
in end-to-end encryption systems. We assess the challenging aspect of content
moderation: maintaining a safe platform while assuring user privacy. We study
the unique features of some content moderation techniques, such as message
franking and perceptual hashing, and highlight their limitations. Currently
implemented content moderation techniques violate the goals of end-to-end
encrypted messaging to some extent. This has led researchers to develop
remediations and design new security primitives to …

content moderation encrypted end end-to-end moderation systems

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA