A new child safety gap in Europe - and why it matters everywhere
A new legal gap in Europe is jeopardizing platforms' ability to detect child sexual abuse material. Here’s what happened, why it matters globally, and what comes next.
Read more
Mitigate risk with proactive child sexual abuse material (CSAM) and exploitation (CSE) detection solutions built by experts in child safety technology.
Trusted by
You must consider privacy-forward solutions that also protect your platform from misuse and safeguard your brand reputation.
Bad actors’ means and methods evolve. To keep pace, you need to monitor threats and youth behavior.
You need child safety expertise and access to sensitive data in order to build effective CSAM detection tools.
With our self-hosted deployment option, you share limited data while gaining access to expert-backed CSAM and exploitation detection solutions.
A secure API-based deployment option is also available.
Thorn’s original research and our team’s issue expertise inform the design of our products and services whether it’s proprietary perceptual hashing, predictive AI, or child safety advisory consulting.
Safer by Thorn’s machine learning classification models were trained using data from trusted sources – in part using data from the National Center for Missing and Exploited Children’s (NCMEC) CyberTipline.
“Thorn is unique in its depth of expertise in both child safety and AI technology. The combination makes them an exceptionally powerful partner in our work to assess and ensure the safety of our models.”
A new legal gap in Europe is jeopardizing platforms' ability to detect child sexual abuse material. Here’s what happened, why it matters globally, and what comes next.
Read moreIn 2025, Safer empowered content moderators and trust & safety professionals to detect, review, and report CSAM and CSE on their platforms.
Read moreFrom 2020-2025, VSCO used Safer to proactively scan all uploaded content for CSAM.
Read moreLearn how our trust and safety solutions can be tailored to your challenges
Our child sexual abuse and exploitation solutions are powered by original research, trusted data, and proprietary technology. Let’s build a safer internet together–your next step starts here.