Our 2021 review of Human Rights Safeguarding Podcasts includes many of this year’s amazing guests. Topics include Addiction, Apple’s NeuralHash CSAM, AgeVerification, John Doe vs Twitter, WhoIS, County Lines, General Comment 25, pack-hunting predators, and the TriChan Takedown: https://traffic.libsyn.com/secure/safetonetfoundation/SafeToNet_Foundation_podcast_-_2021_review.mp3 Welcome to another addition of the safe internet foundation’s safeguarding podcast with Neil Fairbrother exploring the law […]
In this Safeguarding Podcast with Anna Ovaska and Tegan Insoll from Finland’s Protect Children we discuss their research programs “Help Us To Help You” and “No Need for Help”, the compassionate approach Protect Children takes to offender treatment, the drivers, motivations, attitudes and habits of CSAM consumers, and whether offenders’s responses can be trusted. https://traffic.libsyn.com/secure/safetonetfoundation/SafeToNet_Foundation_podcast_-_CSAM_users_in_the_Dark_Web_with_Tegan_Insoll_and_Anna_Ovaska.mp3
In this Safeguarding Podcast: Sean Litton CEO of the Technology Coalition discusses their Five Pillars to eliminate CSAM, Universal Video Hashing, universal Terms of Service, the UN CRC and General Comment 25, Age Verification, their work with EVAC and WeProtect and the UK’s draft Online Safety Bill. https://traffic.libsyn.com/secure/safetonetfoundation/Safetonet_Foundation_podcast_-_the_5_Pillars_with_Sean_Litton_CEO_The_Technology_Coalition.mp3 There’s a lightly edited for legibility transcript below
In this Safeguarding Podcast: Lloyd Richardson Canadian Centre for Child Protection & Professor Michael Salter talk us through the Trichan Takedown, how ISPs fought against CSAM message boards and how some ISPs colluded with them, the role of CDNs such as Cloudflare in CSAM replication and sharing, and the evasive tactics used by the CSAM
In this Safeguarding Podcast: Austin Berrier Homeland Securities Investigations Officer discusses the impact of Apple’s Child Safety tech on Law Enforcement, the live streaming of child sexual abuse on encrypted video streaming services, how online predatory pedophiles hunt in packs, Project Mercury and how Zoom worked with international law enforcement to indict 300 child abusers.
Balancing Trust and Safety in End-to-end Encrypted Platforms The Stanford Internet Observatory hosted a panel of speakers presenting views on new products and services intended to protect children in encrypted spaces. These are the key points we feel that each speaker raised in this debate and we’ve provided our responses to each of these key points.
Welcome to another edition of the SafeToNet Foundation’s safeguarding podcast with Neil Fairbrother, exploring the law culture and technology of safeguarding children online. In this Safeguarding Podcast with Hany Farid, Professor at the University of California, Berkeley: PhotoDNA, what is is and how it works, what PhotoDNA doesn’t do, what are Hashes and do they
Apple’s recent CSAM detection announcement has caused a controversy about online privacy. Privacy of course is something we should all take seriously, especially with the unregulated commercial intrusion into our private use of social media services and of the internet in general. Apple is a private limited company. They provide a service, iCloud, for the
If you already use Apple’s iCloud service and are objecting to their recent announcement that they will search it for evidence of pre-hashed or digitally-finger printed images of illegal child abuse, then it’s too late. You’ve already agreed to allow them to do this, as they explain in their iCloud user agreement, or terms of