Hash/Hash Database

AutorCourtney Radsch
Páginas157-158
157
Hash/Hash Database
41 Hash/Hash Database
Courtney Radsch
A hash is a function that can be used to generate a unique identifier
or value that can then be converted to another value and decoded
via a hash table and is used for several purposes. With respect to
content moderation and platform governance, a hash is akin to a
digital fingerprint that is added to multimedia (photos, video, etc.)
which provides a unique identifier and enables that content to be
identified across the internet and for the search for, and removal of,
the content associated with the hash to be automated.
Hash databases enable the sharing of these unique identifiers, or
hashes, across platforms without having to share the content itself.
Hashing enables coordinated action, such as content takedown,
and allows companies to share information about content deemed
unacceptable for a given platform across different service. Hashing
technology such as PhotoDNA (Microsoft, n.d) has been used to
combat the spread of child pornography, terrorist content, and other
unwanted or illegal content, such as extremist content.
In 2009, Microsoft and Dartmouth University launched (Gregoire,
2015) PhotoDNA to help combat the trafficking and sexual exploitation
of children, and in 2018 (Langston, 2018) expanded its use for video.
The hash database is provided for free to law enforcement and civil
society partners, and overseen (Microsoft, n.d) by the National Center
for Missing & Exploited Children (NCMEC) in the United States.
In 2016, Facebook, together with Google and Microsoft, created a
hash database of ISIS videos to coordinate the removal of terrorist
content. This collaboration formed the basis for the creation of the
Global Internet Forum for Terrorist Content, which grew up around
the hash database to include dozens of companies that coordinate
around content removal and spun off into a stand-along organization
in mid-2020. Critics have raised concerns about the opaque nature
of this collaboration and the failure of the companies involved to
maintain a database or other form of access to affected content
that researchers and independent auditors could review and study.
Although founding companies said the hash database would only

Para continuar a ler

PEÇA SUA AVALIAÇÃO

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT