Article library

Hash Matching Will Save Content Moderation, Faster Than AI Currently Can On Its Own
Explore how highly advanced yet lightweight hash matching technologies can come together with AI to provide a fully comprehensive solution.


Increased Online Protections for Children: Age-Appropriate Design Code Act Passed in California
Officially enacted August 30th, 2022, California’s Age-Appropriate Design Code Act (AADC) is set to be in effect on July 1, 2024.


Ofcom’s Role in Managing the UK’s Online Safety Regulatory Regime
Ofcom is the appointed regulator for the UK's online safety regime. Learn everything you need to know about Ofcom's role and expectations.


Solving Video Identification with Videntifier Technology
New developments in hash technologies can help platform trust and safety teams accurately identify known video content.


Prepare to be Regulated: The UK Online Safety Bill Will Proactively Shield Users From Harm
The UK OSB is expected to go into effect as early as spring 2023, changing the legal framework for platforms with users in the UK.


Trusted Flaggers Under the EU DSA and What Organisations Need to Achieve Status
The EU DSA has established the official status of trusted flagger, whose notices your platform will need to treat with utmost urgency.


UK Online Safety Bill: Prepare for Compliance with Upcoming Regulations
Learn about the regulations introduced in the UK Online Safety Bill, which have the potential take effect as early as autumn 2023.


EU Digital Services Act (DSA): Important Requirements to Meet Compliance
The EU Digital Services Act is changing the way online platforms operate in the EU. Read about the top requirements for compliance here.


The power of hash matching: Using local descriptor hashes to aid content analysts in CSAM Review
Learn about how our local descriptor hash technology helps hotline analysts and content moderators review reported CSAM.


Hash Matching Inside Out: Comparing Hash Types for the Detection of CSAM
Hash technology is a powerful tool for identifying known visual content, and is used by hotlines, law enforcement, industry, and other types of organizations in the removal of illegal visual content. To help readers better understand how exactly hash technologies can help identify visual content, we’ve provided an in-depth look into how the various types of hash technologies work, as well as an explanation of their strengths and weaknesses.
