What methodologies do major tech companies use to detect AI-generated CSAM and how do their detection rates compare?
Major tech firms and safety vendors use a hybrid of legacy hash-matching, perceptual/video hashing, and machine-learned classifiers—augmented by proprietary intelligence and red-teaming—to find AI-gen...