论文标题

部分可观测时空混沌系统的无模型预测

Thoughts on child safety on commodity platforms

论文作者

Levy, Ian, Robinson, Crispin

论文摘要

全球社交媒体和在线通信平台的爆炸式增长改变了我们相互互动和作为一个社会的互动方式,带来了新的安全和隐私挑战。像所有技术一样,这些平台可以被滥用,并且通常被用来试图大规模造成伤害。这些平台启用的最重要的犯罪类型之一是儿童性虐待 - 既扩大现有虐待,又可以实现全新的在线虐待,而对受害者的影响同样灾难性。许多平台在打击这一犯罪方面进行了巨大投资,将确认的证据证明了执法部门。端到端加密和类似技术的引入打破了今天的许多缓解,这导致了有关良好儿童安全以及良好的一般用户隐私和保障的明显二分法的辩论。这场辩论集中在检测使用一种称为客户端扫描技术的罪犯共享已知滥用图像的问题。我们将证明,在线儿童性虐待的真正问题比犯罪者形象共享要复杂得多,这为具有相似技术特征的类别提供了一套新的“伤害原型”,以使其具有相似的技术特征,并且在我们的能力方面,对平台和执法对儿童性虐待内容以及现实世界的影响以及现实世界影响的过程和实际影响的过程更加清晰。我们在高水平上探索了各种潜在解决方案的一部分,并检查在各种用例中可能会产生的好处和无效的技术,并使用假设服务作为如何将各种技术汇集在一起​​以提供用户隐私和安全性,同时保护儿童安全和保护儿童安全行动。

The explosion of global social media and online communication platforms has changed how we interact with each other and as a society, bringing with it new security and privacy challenges. Like all technologies, these platforms can be abused and they are routinely used to attempt to cause harm at scale. One of the most significant offence types that is enabled by these platforms is child sexual abuse - both scaling existing abuse and enabling entirely new types of online-only abuse where the impacts on the victim are equally catastrophic. Many platforms invest significantly in combating this crime, referring confirmed evidence of illegality to law enforcement. The introduction of end-to-end encryption and similar technologies breaks many of the mitigations in place today and this has led to a debate around the apparent dichotomy of good child safety and good general user privacy and security. This debate has concentrated on the problem of detecting offenders sharing known abuse imagery using a technique known as client side scanning. We will show that the real problem of online child sexual abuse is much more complex than offender image sharing, providing a new set of 'harm archetypes' to better group harms into categories that have similar technical characteristics and, as far as we are able, bring more clarity to the processes currently used by platforms and law enforcement in relation to child sexual abuse content and the real world impacts. We explore, at a high level, a variety of techniques that could be used as part of any potential solution and examine the benefits and disbenefits that may accrue in various use cases, and use a hypothetical service as an example of how various techniques could be brought together to provide both user privacy and security, while protecting child safety and enabling law enforcement action.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源