pg. 4
“Tools and Technology
For example, to prevent harm, we've designed many of our features to remind minors who they're sharing with and to limit interactions with strangers.”
“Amongst the detection technologies that we use are photo matching technologies that help us detect, remove and report the sharing of images and videos that exploit children. These photo matching technologies create a unique digital signature of an image (known as a "hash"), which is then compared against a database containing signatures (hashes) of previously identified illegal images to find copies of the same image”
“In addition to photo matching technology that detects known images, we're using artificial intelligence and machine learning to proactively detect child nudity and previously unknown and new child exploitative content, as well as inappropriate interactions with children, sometimes referred to as "grooming".”
“Across our private messaging services, we also use highly predictive behavioural signals, information from user reports, and content and signals from our public spaces to prevent, detect and respond to harm to children.”