SoK: Content Moderation Schemes in End-to-End Encrypted Systems

08/23/2022
by   Chaitanya Rahalkar, et al.
0

This paper aims to survey various techniques utilized for content moderation in end-to-end encryption systems. We assess the challenging aspect of content moderation: maintaining a safe platform while assuring user privacy. We study the unique features of some content moderation techniques, such as message franking and perceptual hashing, and highlight their limitations. Currently implemented content moderation techniques violate the goals of end-to-end encrypted messaging to some extent. This has led researchers to develop remediations and design new security primitives to make content moderation compatible with end-to-end encryption systems. We detail these developments, analyze the proposed research efforts, assess their security guarantees, correlate them with other proposed solutions, and determine suitable improvements under specific scenarios.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/09/2022

Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems

In this paper, we assess existing technical proposals for content modera...
research
07/07/2023

Exploring Encrypted Keyboards to Defeat Client-Side Scanning in End-to-End Encryption Systems

End-to-End Encryption (E2EE) aims to make all messages impossible to rea...
research
10/30/2020

A survey and analysis of TLS interception mechanisms and motivations

TLS is an end-to-end protocol designed to provide confidentiality and in...
research
03/07/2023

SoK: Content Moderation for End-to-End Encryption

Popular messaging applications now enable end-to-end-encryption (E2EE) b...
research
04/13/2021

Going dark? Analysing the impact of end-to-end encryption on the outcome of Dutch criminal court cases

Former US attorney general William Barr and law enforcement colleagues f...
research
04/16/2019

Re: What's Up Johnny? -- Covert Content Attacks on Email End-to-End Encryption

We show practical attacks against OpenPGP and S/MIME encryption and digi...
research
09/03/2020

Robust Homomorphic Video Hashing

The Internet has been weaponized to carry out cybercriminal activities a...

Please sign up or login with your details

Forgot password? Click here to reset