Hashing & Fingerprinting
Use hashing and fingerprinting for known-bad content. Learn perceptual hashing (PhotoDNA, PDQ, TMK+PDQF, NeuralHash), audio fingerprinting, hash-sharing programs (NCMEC, GIFCT, Tech Coalition Lantern), false-positive handling and the cost of mis-hashing, hash-list governance, and the integration into the moderation pipeline upstream of model classification.
6
Lessons
📋
Templates
✅
Practitioner-Ready
100%
Free
Lessons in This Topic
Work through these 6 lessons in order, or jump to whichever is most relevant.
Lilly Tech Systems