See what the Alliance is doing on: Tech industry
Generative AI: Now is the Time for Safety By Design
Publisher: Thorn (Blog)
This piece highlights that now is the time to apply safety by design in the development, deployment and maintenance of generative AI.
Child safety and end-to-end encryption: irreconcilable or a possible match?
Publisher: Cyacomb (Blog)
Donagh O’Malley, Advisor at Cyacomb, reflects in this opinion piece on the relationship between child safety and end-to-end encryption.
Link-sharing and child sexual abuse: understanding the threat
Publisher: GCHQ, WeProtect Global Alliance (Briefing)
This report provides an overview of the issue of link sharing to child sexual exploitation and abuse online.
The Metaverse, Online Sexual Exploitation and Sexual Abuse of Children – a new challenge for today’s global society?
Publisher: NASK – National Research Institute (Briefing)
The author of this short paper intends to contribute to the discussion on the future of eXtended Reality Technologies and their implications for sexual exploitation and sexual abuse of children.
Extended Reality technologies and child sexual exploitation and abuse
Publisher: The University of Manchester, WeProtect Global Alliance (Briefing)
This intelligence briefing explores eXtended Reality (XR), looking at its meaning, applications and risks related to child sexual exploitation and abuse.
Publisher: Internet Watch Foundation, SafeToNet (Media)
A real-time image and video threat detection technology, which is able to detect harmful content such as child sexual abuse material.
The Digital Well-Being Index
Publisher: Snap (Report)
This index is a measure of Generation Z’s (13-to-24-year-olds) online psychological well-being.
Privacy and Protection: A children’s rights approach to encryption
Publisher: CRIN (Report)
This report aims to capture the full complexity of how encryption affects children’s lives. It sets out principles for an approach to encryption that recognises and respects the full range…
MEGA Transparency Report
Publisher: Mega (Report)
This report shows Mega’s processes for dealing with users who upload and share copyright-infringing material or breach any other legal requirements.
The role of age verification technology in tackling child sexual exploitation and abuse online
Publisher: WeProtect Global Alliance, Yoti (Briefing)
This intelligence briefing explores the role that age assurance can play in safeguarding children, the current regulatory landscape around age and different methods of age assurance.