Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems

02/09/2022
by   Seny Kamara, et al.
0

In this paper, we assess existing technical proposals for content moderation in End-to-End Encryption (E2EE) services. First, we explain the various tools in the content moderation toolbox, how they are used, and the different phases of the moderation cycle, including detection of unwanted content. We then lay out a definition of encryption and E2EE, which includes privacy and security guarantees for end-users, before assessing current technical proposals for the detection of unwanted content in E2EE services against those guarantees. We find that technical approaches for user-reporting and meta-data analysis are the most likely to preserve privacy and security guarantees for end-users. Both provide effective tools that can detect significant amounts of different types of problematic content on E2EE services, including abusive and harassing messages, spam, mis- and disinformation, and CSAM, although more research is required to improve these tools and better measure their effectiveness. Conversely, we find that other techniques that purport to facilitate content detection in E2EE systems have the effect of undermining key security guarantees of E2EE systems.

READ FULL TEXT

page 2

page 6

page 13

page 18

page 24

page 32

page 35

page 36

research
08/23/2022

SoK: Content Moderation Schemes in End-to-End Encrypted Systems

This paper aims to survey various techniques utilized for content modera...
research
03/07/2023

SoK: Content Moderation for End-to-End Encryption

Popular messaging applications now enable end-to-end-encryption (E2EE) b...
research
06/01/2020

An End-to-End Encryption Solution for Enterprise Content Applications

The content host services (like Dropbox, OneDrive, and Google Drive) use...
research
10/30/2020

A survey and analysis of TLS interception mechanisms and motivations

TLS is an end-to-end protocol designed to provide confidentiality and in...
research
01/17/2011

SafeVchat: Detecting Obscene Content and Misbehaving Users in Online Video Chat Services

Online video chat services such as Chatroulette, Omegle, and vChatter th...
research
12/12/2018

Analysis and Consideration on Management of Encrypted Traffic

There are two seemingly contradicting trends in the current Internet: in...
research
06/03/2020

Detecting Misinformation on WhatsApp without Breaking Encryption

The popularity of smartphone messaging apps like WhatsApp are revolution...

Please sign up or login with your details

Forgot password? Click here to reset