Abstract
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and European Union emphasize child sexual abuse material and misinformation in messaging and storage, we identify and synthesize a wealth of scholarship that goes far beyond those topics. We bridge literature that is diverse in both content moderation subject matter, such as malware, spam, hate speech, terrorist content, and enterprise policy compliance, as well as intended deployments, including not only privacy-preserving content moderation for messaging, email, and cloud storage, but also private introspection of encrypted web traffic by middleboxes. In this work, we systematize the study of content moderation in E2EE settings. We set out a process pipeline for content moderation, drawing on a broad interdisciplinary literature that is not specific to E2EE. We examine cryptography and policy design choices at all stages of this pipeline, and we suggest areas of future research to fill gaps in literature and better understand possible paths forward.
Publisher
Privacy Enhancing Technologies Symposium Advisory Board
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Key extraction-based lawful access to encrypted data: Taxonomy and survey;Forensic Science International: Digital Investigation;2024-09
2. Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
3. A Multimodal Content Moderation System using Adversarial Machine Learning;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05
4. Private Hierarchical Governance for Encrypted Messaging;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
5. Group Moderation Under End-to-End Encryption;Proceedings of the Symposium on Computer Science and Law;2024-03-12