Facing a new reality in the online marketplace for child sexual exploitation
Explore new data on online child sexual exploitation and the evolving risks youth face.
Read moreMitigate risk with proactive child sexual abuse material (CSAM) and exploitation (CSE) detection solutions built by experts in child safety technology.
Trusted by
You must consider privacy-forward solutions that also protect your platform from misuse and safeguard your brand reputation.
Bad actors’ means and methods evolve. To keep pace, you need to monitor threats and youth behavior.
You need child safety expertise and access to sensitive data in order to build effective CSAM detection tools.
With our self-hosted deployment option, you share limited data while gaining access to expert-backed CSAM detection solutions.
A secure API-based deployment option is also available.
Thorn’s original research and our team’s issue expertise inform the design of our products and services whether it’s proprietary perceptual hashing, predictive AI, or child safety advisory consulting.
Safer by Thorn’s machine learning classification models were trained using data from trusted sources – in part using data from the National Center for Missing and Exploited Children’s (NCMEC) CyberTipline.
“Safer Predict’s text classifier significantly improves our ability to prioritize and escalate high-risk content and accounts. The multiple labels and risk scores help our team focus on problem accounts, some of which we had been suspicious about but lacked actionable evidence before we deployed the classifier. Thorn’s expertise is evident in Safer’s ability to detect conversations that could lead to sexual harms against children.”
Explore new data on online child sexual exploitation and the evolving risks youth face.
Read moreFind out why content moderation matters for every platform, and get a step-by-step approach to finding your content moderation solution.
Read moreDeepfake technology is evolving at an alarming rate, lowering the barrier for bad actors to create hyper-realistic explicit images in seconds—with no technical expertise required.
Read moreLearn how our trust and safety solutions can be tailored to your challenges
Our child sexual abuse and exploitation solutions are powered by original research, trusted data, and proprietary technology. Let’s build a safer internet together–your next step starts here.