On-Device Context: A defense against misinformation in the encrypted WhatsApp

Balancing privacy, security, and mitigation of misinformation

How it works

Types of threats

Goals and Constraints

Potential Challenges

User resource constraints: Bandwidth, Storage, CPU, Battery

Fact checking credibility and costs

UX and psychosocial challenges

Increased government pressure

Conclusions

Founder of the Thoughtful Technology Project & GMF non-res fellow. Prev Tow fellow & Chief Technologist @ Center for Social Media Responsibility. av@aviv.me

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store