Index/Topics/Encryption and Surveillance

Encryption and Surveillance

The use of encryption and anonymizing services complicates the discovery of CSAM, while voluntary industry scanning programs and NCMEC reporting create powerful surveillance vectors.