Index/Topics/PhotoDNA

PhotoDNA

A perceptual-hash system used to detect visually similar images.

Fact-Checks

9 results
Jan 22, 2026
Most Viewed

Why do some CyberTips arrive and within a month are investigated while others years or never? If quality level is the same?

Why two CyberTips that look the same on paper receive different responses often comes down to system-wide triage choices, incomplete or inconsistent data from reporting platforms, legal and technical ...

Jan 12, 2026
Most Viewed

How do courts treat cryptographic hash evidence in CSAM prosecutions when original devices are missing?

Courts treat cryptographic hashes as powerful tools for identifying known CSAM but not as standalone proof of content when the original image or device is unavailable; admissibility hinges on authenti...

Feb 4, 2026

How does Google’s Hash Matching API generate and format image hashes sent to NCMEC?

generates digital “hashes” or fingerprints for images and videos using automated hashing and fingerprinting tools, then shares those fingerprints with ’s hash-sharing system so organizations can match...

Jan 30, 2026

What notification, retention, and reporting processes do ISPs follow after detecting potential CSAM access?

Internet service providers (ISPs and online service operators detect potential using automated hashing and filtering tools and then take a mix of technical and legal steps: block or remove access, not...

Jan 23, 2026

How do open‑source generative models affect platform responsibilities and detection strategies for AIG‑CSAM?

Open‑source generative models have broadened the attack surface for (AIG‑CSAM) by enabling unfettered modification, fine‑tuning, and redistribution of models that can be turned toward abuse, complicat...

Jan 23, 2026

How do ESPs decide which images to automatically flag and report to NCMEC’s CyberTipline?

(ESPs) decide which images to automatically flag and report to through a mix of statutory duty, using hashes and AI, and internal triage practices that often include human review; the process is shape...

Jan 17, 2026

How are newly discovered CSAM files validated, hashed, and added to shared databases used by industry?

Newly discovered CSAM files are first identified by automated detectors or user reports, then vetted by expert reviewers before being converted into specialized hashes and shared in controlled databas...

Jan 6, 2026

iwf talks about usage of grid image for hash collisions, waht is being down to prevent thsi

The “grid image” approach in perceptual hashing—where an image is mapped to grid-based gradient or cell summaries—creates structured, low-dimensional fingerprints that can produce unintended hash coll...

Jan 6, 2026

What metadata and provider logs are most commonly used by law enforcement to establish probable cause in CSAM probes?

Law enforcement most commonly relies on hashed fingerprints of known CSAM, network and server logs (IP addresses and timestamps), account and authentication records, and device/file metadata preserved...