Moderating End-to-End Encrypted Content - Balancing Privacy and Control
Offered By: USENIX Enigma Conference via YouTube
Course Description
Overview
Explore a 22-minute conference talk from USENIX Enigma 2022 that delves into the challenges of moderating end-to-end encrypted (E2EE) content. Discover how Mallory Knodel from the Center for Democracy & Technology proposes formal definitions of E2EE to address tensions between privacy guarantees and legitimate information control needs. Learn about concrete proposals for improving E2EE systems while maximizing confidentiality, integrity, and authenticity. Gain insights into effective tools for detecting problematic content on E2EE services, including user reporting mechanisms and metadata analysis, which can help identify abusive messages, spam, misinformation, and CSAM while preserving user privacy and security. Understand the importance of balancing user experience, enhanced usability, and availability in E2EE improvements.
Syllabus
USENIX Enigma 2022 - You Can’t Always Get What You Want / But You Get What You Need: Moderating E2EE
Taught by
USENIX Enigma Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network