Privy Labs Protocol Whitepaper v 1.0
  • Privy Labs Protocol
    • Introduction
      • The paradox of social media
      • The persistence of piracy
      • The bottom line
    • Solution Overview
    • Team
  • Our Philosophy & Values
    • 3 Core Tenets
    • Our Why
    • Why Web3
  • Our Approach
    • Problem-solving at the source
      • Core Primitives
      • Copyright - Originality, Creativity, & Fixation
      • The DMCA
      • Removal
  • The Core Technology
    • Systems Overview
      • Virtual Account System
        • Account Abstraction
        • Privacy
        • Gas
      • Content Certificate & Tracking System
        • Proof of Ownership
        • Watermarking
        • Encryption & Cryptography
        • Storage
        • Publicity & Privacy
      • Content Verification Network
        • Permissioned Approval
        • Takedown
  • Use Cases
    • Use Cases
      • Sensitive content: Adult creators, models, & sex workers
      • Content Creators
      • Digital artists & photographers
      • Journalists
      • Families
      • Celebrities
      • Social media platforms & creative marketplaces
      • Trust & Safety Organizations
  • PrivyCam
  • Governance & Community
    • Privy DAO
  • Tokenomics & Incentives
    • Incentive Model
  • Risks & Mitigants
    • Risks & Mitigants
  • Our Roadmap
    • Our Roadmap
Powered by GitBook
On this page
  1. The Core Technology
  2. Systems Overview
  3. Content Verification Network

Takedown

Our takedown process will occur in two phases: recognition and escalation.

Based on our watermark, we run a machine learning classification algorithm to search for our unique watermark noise by scraping existing internet content. If a match is found, we follow established processes to escalate DMCA requests for out-of-scope content on the creator’s behalf.

As our content verification network grows, we begin to form a large-scale in-scope/out-of-scope definition for users, domains, and content; in this, we are able to more effectively identify exceptions to user-defined scope rules and unauthorized content distribution. By partnering with prominent CDNs serving content to the majority of the internet (Cloudflare, Stackpath, Rackspace) our scoped approval network will become an embedded step to serving symetrically-controllable content en masse.

We describe an additional takedown mechanism in our Tokenomics section where members of the community run public models for detection (not unlike the Folding@home distributed computing project).

PreviousPermissioned ApprovalNextUse Cases

Last updated 2 years ago