SoK: Content Moderation for End-to-End Encryption

03/07/2023
by   Sarah Scheffler, et al.
0

Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and European Union emphasize child sexual abuse material and misinformation in messaging and storage, we identify and synthesize a wealth of scholarship that goes far beyond those topics. We bridge literature that is diverse in both content moderation subject matter, such as malware, spam, hate speech, terrorist content, and enterprise policy compliance, as well as intended deployments, including not only privacy-preserving content moderation for messaging, email, and cloud storage, but also private introspection of encrypted web traffic by middleboxes. In this work, we systematize the study of content moderation in E2EE settings. We set out a process pipeline for content moderation, drawing on a broad interdisciplinary literature that is not specific to E2EE. We examine cryptography and policy design choices at all stages of this pipeline, and we suggest areas of future research to fill gaps in literature and better understand possible paths forward.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/09/2022

Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems

In this paper, we assess existing technical proposals for content modera...
research
08/23/2022

SoK: Content Moderation Schemes in End-to-End Encrypted Systems

This paper aims to survey various techniques utilized for content modera...
research
06/01/2020

An End-to-End Encryption Solution for Enterprise Content Applications

The content host services (like Dropbox, OneDrive, and Google Drive) use...
research
01/12/2021

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes

Middleboxes in a computer network system inspect and analyse network tra...
research
02/25/2019

SafeEmail A safe and reliable email communication system without any spam

Using multi group asymmetric public and private keys, this paper propose...
research
07/24/2023

Understanding the Governance Challenges of Public Libraries Subscribing to Digital Content Distributors

As popular demand for digital information increases, public libraries ar...
research
06/20/2021

SISA: Securing Images by Selective Alteration

With an increase in mobile and camera devices' popularity, digital conte...

Please sign up or login with your details

Forgot password? Click here to reset