论文标题

外部查看:端到端加密系统中内容审核的方法

Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems

论文作者

Kamara, Seny, Knodel, Mallory, Llansó, Emma, Nojeim, Greg, Qin, Lucy, Thakur, Dhanaraj, Vogus, Caitlin

论文摘要

在本文中,我们评估了端到端加密(E2EE)服务中内容审核的现有技术建议。首先,我们解释了内容调节工具箱中的各种工具,如何使用它们以及适度周期的不同阶段,包括检测不需要的内容。然后,我们制定了对加密和E2EE的定义,其中包括最终用户的隐私和安全保证,然后在评估当前的技术建议中,以发现E2EE服务中不需要的内容,以针对这些保证。 我们发现,用户报告和元数据分析的技术方法最有可能保留最终用户的隐私和安全保证。两者都提供有效的工具,可以在E2EE服务上检测大量不同类型的有问题的内容,包括滥用和骚扰消息,垃圾邮件,错误和虚假信息以及CSAM,尽管需要更多的研究来改善这些工具并更好地衡量其有效性。相反,我们发现旨在促进E2EE系统中内容检测的其他技术具有破坏E2EE系统的关键安全保证的作用。

In this paper, we assess existing technical proposals for content moderation in End-to-End Encryption (E2EE) services. First, we explain the various tools in the content moderation toolbox, how they are used, and the different phases of the moderation cycle, including detection of unwanted content. We then lay out a definition of encryption and E2EE, which includes privacy and security guarantees for end-users, before assessing current technical proposals for the detection of unwanted content in E2EE services against those guarantees. We find that technical approaches for user-reporting and meta-data analysis are the most likely to preserve privacy and security guarantees for end-users. Both provide effective tools that can detect significant amounts of different types of problematic content on E2EE services, including abusive and harassing messages, spam, mis- and disinformation, and CSAM, although more research is required to improve these tools and better measure their effectiveness. Conversely, we find that other techniques that purport to facilitate content detection in E2EE systems have the effect of undermining key security guarantees of E2EE systems.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源