Detecting CSAM within video content presents unique challenges. To solve this, Thorn's engineers developed a proprietary hashing technology called SSVH.| Purpose-Built Trust and Safety Solutions | Safer by Thorn
Online child sexual abuse and exploitation has continued to rise for more than a decade. Understand the scale of the issue and the emerging trends to watch for.| Purpose-Built Trust and Safety Solutions | Safer by Thorn
This 7-part series is an essential guide to understanding CSAM and the available detection strategies leveraged by trust and safety professionals.| Purpose-Built Trust and Safety Solutions | Safer by Thorn
CSAM has distinct characteristics that call for purpose-built solutions, such as CSAM classifiers. Thorn's data science team dives into the details.| Purpose-Built Trust and Safety Solutions | Safer by Thorn
Detect known CSAM using hashing and matching, sometimes referred to as CSAM scanning. Learn how it works.| Purpose-Built Trust and Safety Solutions | Safer by Thorn
Know the signs that could indicate your platform is at risk of hosting CSAM images and videos. Understand what types of sites are most at risk.| Purpose-Built Trust and Safety Solutions | Safer by Thorn
A glossary of special terms and acronyms used within the child safety ecosystem. What's CSAM? CSEA? CSAI? Do they refer to different harms?| Purpose-Built Trust and Safety Solutions | Safer by Thorn
There are several child safety organizations that make their CSAM hash lists available to select partners via sharing programs. Learn more.| Purpose-Built Trust and Safety Solutions | Safer by Thorn