Detecting CSAM: Through Hashing and Intermediaries

The Cyber Blog IndiaLaw

Detecting CSAM, Hashing, and Intermediaries

Governments across the globe frequently claim child sexual abuse material (CSAM) and potential terrorist activity as justifications to support backdoors in encryption-based services. Big tech companies continue to face pressure while offering end-to-end encrypted services. Is the roll-out of on-device … Read More