Your fact-checks

Your fact-checks will appear here

factually
Support us
  • Home
  • Politics
  • Business
  • Society
  • Technology
  • Health
  • Science
  • Entertainment
Index/Organizations/Safer by Thorn

Safer by Thorn

Fact-Checks

4 results
Dec 14, 2025
Most Viewed

What technical indicators do ISPs use to identify CSAM viewing versus accidental access?

ISPs and related providers primarily rely on hash-matching (including fuzzy hashes and PhotoDNA), blocklists from organisations like the Internet Watch Foundation (IWF), and classifier/AI tools to det...

Dec 9, 2025
Most Viewed

What retention policies govern NCMEC tip data and how long is information stored?

The REPORT Act raised the legal minimum preservation period for information tied to CyberTipline reports from 90 days to one year, letting providers preserve report contents up to 12 months and allowi...

Jan 31, 2026

Are instagram ncmec reports immediate

reports to the are not uniformly "immediate" in the literal sense; timing depends on how Instagram () detects or receives a signal, whether a human has reviewed the content, and on procedural choices ...

Dec 14, 2025

What techniques do ISPs use to distinguish intentional possession from accidental viewing of CSAM?

ISPs and platforms rely mainly on automated detection: hash-matching (exact and fuzzy), machine‑learning classifiers, URL/DNS blocklists and metadata heuristics to surface known or likely CSAM; many c...

About
Blog
Contact
FAQ
Terms & ConditionsTerms
Privacy PolicyPrivacy
Manage data