Your fact-checks

Your fact-checks will appear here

factually
Support us
  • Home
  • Politics
  • Business
  • Society
  • Technology
  • Health
  • Science
  • Entertainment
Index/Topics/Hash-Matching Technologies

Hash-Matching Technologies

Hash-matching technologies like PhotoDNA are used to detect CSAM, but relying solely on hash matches can risk excluding evidence obtained without lawful process.

Fact-Checks

4 results
Jan 16, 2026
Most Viewed

How do defenses argue lack of intent in CSAM receipt cases and what evidence counters them?

Defenses in CSAM receipt prosecutions commonly claim lack of intent by arguing files were unknowingly downloaded, hidden in archives, automatically synced from cloud services, or created by others who...

Jan 11, 2026
Most Viewed

do cyberlockers often provide ncmec and authorities with enough metadata and logs to pursue downloaders of csam

Cyberlockers sometimes supply NCMEC and law enforcement with the metadata and logs necessary to pursue downloaders of child sexual abuse material (CSAM), but this access is uneven and contingent on th...

Jan 23, 2026
Most Viewed

How does NCMEC handle non-realistic illustrations and text?

’s public materials and partner guidance treat computer-generated or illustrated depictions that appear realistic as within the scope of () and subject to reporting through the , while text-based sexu...

Feb 4, 2026

How does PhotoDNA hashing work and what are its limitations for detecting AI-generated CSAM?

is a perceptual-hash system developed to detect known child sexual abuse material (CSAM) by turning images into robust “fingerprints” that match variants of the same picture even after simple edits, a...

About
Blog
Contact
FAQ
Terms & ConditionsTerms
Privacy PolicyPrivacy
Manage data