YoVDO

Moderating End-to-End Encrypted Content - Balancing Privacy and Control

Offered By: USENIX Enigma Conference via YouTube

Tags

End-to-End Encryption Courses Cybersecurity Courses Privacy Courses Misinformation Courses Child Safety Courses Content Moderation Courses Spam Detection Courses Metadata Analysis Courses

Course Description

Overview

Explore a 22-minute conference talk from USENIX Enigma 2022 that delves into the challenges of moderating end-to-end encrypted (E2EE) content. Discover how Mallory Knodel from the Center for Democracy & Technology proposes formal definitions of E2EE to address tensions between privacy guarantees and legitimate information control needs. Learn about concrete proposals for improving E2EE systems while maximizing confidentiality, integrity, and authenticity. Gain insights into effective tools for detecting problematic content on E2EE services, including user reporting mechanisms and metadata analysis, which can help identify abusive messages, spam, misinformation, and CSAM while preserving user privacy and security. Understand the importance of balancing user experience, enhanced usability, and availability in E2EE improvements.

Syllabus

USENIX Enigma 2022 - You Can’t Always Get What You Want / But You Get What You Need: Moderating E2EE


Taught by

USENIX Enigma Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network