Explore the findings of a survey on trust and safety techniques employed by major online service providers in this 20-minute conference talk from USENIX Enigma 2022. Delve into the distinction between content-dependent and content-oblivious techniques for policing harmful online content. Learn about the prevalence and effectiveness of various methods, including abuse-reporting features, metadata-based tools, and automated content scanning systems. Discover insights on the varying utility of these techniques across different types of online abuse, particularly in detecting child sex abuse imagery. Examine the implications of these findings for policy debates surrounding online service providers' anti-abuse obligations and the use of end-to-end encryption. Gain valuable perspective on the challenges and complexities of maintaining trust and safety in online environments serving billions of users.
Content-Oblivious Trust and Safety Techniques - Survey Results from Online Service Providers
USENIX Enigma Conference via YouTube
Overview
Syllabus
USENIX Enigma 2022 - Content-Oblivious Trust and Safety Techniques: Results from a Survey of Online
Taught by
USENIX Enigma Conference