Webinar Combating Financial Sextortion: The Latest Trends and Proactive Solutions ON-DEMAND | Hosted by Thorn, in collaboration with the National Center for Missing and Exploited Children
Learn The Dual Role of Technology: Thorn’s Insights From NCMEC’s 2023 CyberTipline Report In 2023, NCMEC’s CyberTipline received a staggering 36.2 million reports of suspected child sexual exploitation.
Learn Youth Tell the Truth About Safety Tools: Advice on How to Improve These Tools From Actual Teens Platform safety tools — like blocking and reporting — are often a child’s first choice for responding to a harmful sexual interaction online. Instead of seeking support from a parent or
Learn The REPORT Act Is Now Federal Law – Here’s What It Means for Online Platforms The REPORT Act is now federal law. We provide details about its components and explain how it will impact online platforms.
Learn Unmasking the Perpetrators Online: Profiles of Bad Actors for Use by Trust and Safety Learn how easy access to children online has given rise to new types of child sexual perpetrators.
Learn 4 Considerations for Improving Your Child Safety Policies 4 considerations for Trust and Safety teams at digital platforms as they review their child safety policies. Here’s what to consider.
Learn The Kids Online Safety Act (KOSA) Explained: What the Drafted Bill Could Mean for Your Online Platform Thorn's policy team explains the Kids Online Safety Act (KOSA) and how the provisions in this bill may impact digital platforms.
Learn Key Takeaways from the Online Child Sexual Exploitation Hearing with Social Media CEOs On January 31, the CEOs of Meta, TikTok, Snap, and Discord testified during the hearing, "Big Tech and the Online Child Sexual Exploitation Crisis."
Learn Thorn’s Head of Data Science discuss how machine learning can support child safety on content-hosting platforms Watch Dr. Rebecca Portnoff’s keynote at AWS re:Invent 2023 to learn how Thorn is using machine learning to detect CSAM.
Case Study VSCO Uses Safer to Protect Its Platform and Community of Creators from CSAM at Scale For VSCO, building Safer into its infrastructure unlocked automated solutions and moderation efficiencies for VSCO’s trust and safety and content moderation teams.
Learn Hashing and Matching is Core to Proactive CSAM Detection Detect known CSAM using hashing and matching, sometimes referred to as CSAM scanning. Learn how it works.
Product Updates Safer’s 2022 Impact Report In 2022, Safer empowered content moderators and trust & safety professionals to detect, review, and report CSAM from their platforms.
Case Study Flickr Uses CSAM Image Classifier to Find Harmful Content Flickr’s Trust & Safety team uses Safer’s CSAM Image Classifier to detect and remove previously unknown child abuse content from their platform.
Product Updates Announcing RCMP Reporting via Safer Detect CSAM and send reports to Royal Canadian Mounted Police from Safer, an all-in-one solution for CSAM moderation.
Learn Safer’s Self-Hosted Deployment Provides Control, Security and Scalability Safer is a flexible suite of tools designed to support your company’s processes and scale your child sexual abuse material (CSAM) elimination efforts.
Product Updates Safer’s 2021 Impact Report In 2021, Safer empowered content moderators and trust & safety professionals to detect, report and remove CSAM from their content-hosting platforms.
Product Updates Let’s Build a Better Internet for Every Child: Safer’s best-in-class technology is now available for anyone with an AWS Marketplace account Safer by Thorn is available in the AWS Marketplace. Safer integrates with your AWS Cloud infrastructure for better control, scalability, and security.
Learn The challenge of detecting CSAM videos and what we can do about it today Detecting CSAM within video content presents unique challenges. To solve this, Thorn's engineers developed a proprietary hashing technology called SSVH.
Product Updates Announcing Safer Enterprise for Detection and Post-Detection of CSAM Our first version of Safer includes end-to-end functionality to support the identification, removal, and reporting of CSAM at scale and in real-time. Comprehensive coverage begins with proactive detection. Read more about the features we've released.