Skip to content

Trust and Safety Operations ​

Building the systems and teams that protect marketplace participants from fraud, abuse, and harm while maintaining platform integrity.

Why This Matters ​

  • 🏒 Owner: Trust is the currency of your marketplace. A single high-profile fraud incident or safety failure can destroy years of brand equity and trigger regulatory scrutiny. Investing in trust and safety is not optional β€” it is existential.
  • πŸ’» Dev: You will build the detection pipelines, verification systems, and moderation tools that keep the platform safe. The technical architecture must handle real-time fraud scoring, content analysis, and identity verification at scale.
  • πŸ“‹ PM: You own the policies and workflows that define what is allowed, how violations are detected, and how they are resolved. Balancing safety with friction is one of the hardest product challenges in marketplace design.
  • 🎨 Designer: Safety features must be visible enough to build confidence but not so intrusive that they derail the core experience. Design verification flows, reporting interfaces, and safety communications that feel protective rather than punitive.

The Concept (Simple) ​

Think of a marketplace like a busy street market. The market manager does not personally vouch for every vendor or inspect every product, but they do several things to keep the market safe:

  • They check vendor permits at the gate (identity verification)
  • They have security guards walking the aisles (fraud detection)
  • They post rules on signs at every entrance (content policies)
  • They keep an office where buyers can file complaints (reporting)
  • They remove bad vendors and ban repeat offenders (enforcement)

A digital marketplace needs all of these functions, but automated and operating at scale. The challenge is that bad actors are creative, persistent, and constantly evolving their tactics. Your trust and safety operations must evolve faster.

The goal is not zero fraud β€” that would require so much friction that legitimate users would leave. The goal is to make fraud expensive and difficult while keeping the experience smooth for honest participants.

How It Works (Detailed) ​

The Four Pillars of Trust and Safety ​

Trust and safety operations rest on four interconnected pillars, each requiring dedicated systems and processes.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                   TRUST AND SAFETY FRAMEWORK                    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚   PREVENTION   β”‚  DETECTION    β”‚  RESPONSE    β”‚  ENFORCEMENT   β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ Identity       β”‚ Automated     β”‚ Triage and   β”‚ Warnings       β”‚
β”‚ verification   β”‚ scanning      β”‚ escalation   β”‚                β”‚
β”‚                β”‚               β”‚              β”‚                β”‚
β”‚ KYC/KYB        β”‚ ML fraud      β”‚ Investigationβ”‚ Suspensions    β”‚
β”‚ checks         β”‚ models        β”‚              β”‚                β”‚
β”‚                β”‚               β”‚              β”‚                β”‚
β”‚ Background     β”‚ User reports  β”‚ Resolution   β”‚ Permanent      β”‚
β”‚ checks         β”‚ and flags     β”‚ decisions    β”‚ bans           β”‚
β”‚                β”‚               β”‚              β”‚                β”‚
β”‚ Document       β”‚ Pattern       β”‚ Communicationβ”‚ Legal          β”‚
β”‚ verification   β”‚ analysis      β”‚ to parties   β”‚ referrals      β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Fraud Detection ​

Marketplace fraud takes many forms. Each type requires specific detection strategies.

Fake Listings ​

Fake listings are posts for products or services that do not exist, designed to steal payment or personal information.

SignalDetection MethodExample
Stolen photosReverse image searchListing uses stock photos
Too-good pricingPrice anomaly detectioniPhone listed at 80% below market
New accountAccount age and activity scoringCreated today, 10 listings posted
Copied descriptionsText similarity analysisDescription matches known scam
Contact redirectionCommunication pattern analysisPushes buyers off-platform

eBay detects approximately 200 million fraudulent listings per year using a combination of automated scanning and human review. Their system checks every listing against known fraud patterns within milliseconds of submission.

Fake Reviews ​

Fake reviews undermine the trust signals that marketplace participants rely on for decision-making.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚              FAKE REVIEW DETECTION PIPELINE               β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                          β”‚
β”‚  Review Submitted                                        β”‚
β”‚       β”‚                                                  β”‚
β”‚       β–Ό                                                  β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                                     β”‚
β”‚  β”‚ Behavioral Check │──── Was there a real transaction?  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜                                     β”‚
β”‚           β”‚                                              β”‚
β”‚           β–Ό                                              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                                     β”‚
β”‚  β”‚ Pattern Analysis │──── Review velocity, timing,       β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜     sentiment clustering            β”‚
β”‚           β”‚                                              β”‚
β”‚           β–Ό                                              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                                     β”‚
β”‚  β”‚ Network Analysis │──── Reviewer connections,          β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜     device fingerprints             β”‚
β”‚           β”‚                                              β”‚
β”‚           β–Ό                                              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                                     β”‚
β”‚  β”‚ Content Analysis │──── NLP for generic language,      β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”˜     copy-paste detection            β”‚
β”‚           β”‚                                              β”‚
β”‚           β–Ό                                              β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                        β”‚
β”‚  β”‚ Fraud Score: Publish / Hold / Reject                  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                        β”‚
β”‚                                                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Amazon estimates that over 200 million suspected fake reviews were blocked or removed in 2022. Their detection system looks for coordinated review rings β€” groups of accounts that review the same products in patterns that differ from organic behavior.

Payment Fraud ​

Payment fraud includes stolen credit cards, chargeback abuse, and money laundering through marketplace transactions.

Key signals include:

  • Mismatched billing and shipping addresses
  • Rapid succession of high-value purchases from new accounts
  • Unusual payment method patterns (prepaid cards, multiple cards)
  • Transactions just below reporting thresholds (structuring)
  • Buyers who never dispute but always request refunds

Stripe, which powers payments for many marketplaces, uses Radar β€” a machine learning fraud detection system trained on data from millions of businesses. It blocks an average of 4 basis points of fraudulent transactions automatically.

Identity Fraud ​

Identity fraud occurs when users misrepresent who they are to gain access or avoid accountability.

Common tactics include:

  • Fake government IDs or doctored documents
  • Stolen identity credentials
  • Multiple accounts to circumvent bans (ban evasion)
  • Business identity fabrication

Content Moderation Pipeline ​

Content moderation requires a layered approach combining automated systems with human judgment.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚              CONTENT MODERATION PIPELINE                      β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                              β”‚
β”‚  Content Created (listing, message, review, profile)         β”‚
β”‚       β”‚                                                      β”‚
β”‚       β–Ό                                                      β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                            β”‚
β”‚  β”‚  LAYER 1: Pre-publish Filter  β”‚                            β”‚
β”‚  β”‚  - Keyword blocklists         β”‚                            β”‚
β”‚  β”‚  - Image hashing (PhotoDNA)   β”‚                            β”‚
β”‚  β”‚  - Prohibited category check  β”‚                            β”‚
β”‚  β”‚  - Spam pattern matching      β”‚                            β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                            β”‚
β”‚                 β”‚                                             β”‚
β”‚        β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”                                    β”‚
β”‚        β–Ό                 β–Ό                                    β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                               β”‚
β”‚   β”‚  PASS   β”‚      β”‚  FLAGGED β”‚                               β”‚
β”‚   β”‚ Publish β”‚      β”‚  Queue   β”‚                               β”‚
β”‚   β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”˜                               β”‚
β”‚        β”‚                β”‚                                     β”‚
β”‚        β–Ό                β–Ό                                     β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                            β”‚
β”‚  β”‚  LAYER 2: Post-publish Scan   β”‚                            β”‚
β”‚  β”‚  - ML classification models   β”‚                            β”‚
β”‚  β”‚  - User reports and flags     β”‚                            β”‚
β”‚  β”‚  - Behavioral signals         β”‚                            β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                            β”‚
β”‚                 β”‚                                             β”‚
β”‚                 β–Ό                                             β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                            β”‚
β”‚  β”‚  LAYER 3: Human Review        β”‚                            β”‚
β”‚  β”‚  - Trained moderator team     β”‚                            β”‚
β”‚  β”‚  - Specialist escalation      β”‚                            β”‚
β”‚  β”‚  - Policy edge cases          β”‚                            β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                            β”‚
β”‚                 β”‚                                             β”‚
β”‚        β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”                                    β”‚
β”‚        β–Ό                 β–Ό                                    β”‚
β”‚   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”                              β”‚
β”‚   β”‚ Approved β”‚     β”‚  Removed  β”‚                              β”‚
β”‚   β”‚          β”‚     β”‚ + Action  β”‚                              β”‚
β”‚   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                              β”‚
β”‚                                                              β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Airbnb's content moderation team reviews millions of listings and photos. They use machine learning to auto-classify images (e.g., detecting weapons or explicit content in listing photos) and route edge cases to human reviewers who specialize in regional and cultural context.

Identity Verification ​

Identity verification is the front door of trust. The depth of verification should match the risk profile of the marketplace.

Verification LevelMethodsUse CaseExample Platform
BasicEmail, phone, social loginLow-value transactionsCraigslist
StandardGovernment ID scan, selfieMedium-value, peer-to-peerAirbnb, Uber
EnhancedBackground check, referencesHigh-trust servicesRover, Care.com
BusinessKYB, tax ID, business licenseB2B or regulated industriesAmazon Marketplace

KYC (Know Your Customer) Flow ​

Airbnb requires government ID verification for both hosts and guests. Their process:

  1. User uploads a photo of a government-issued ID
  2. Automated system extracts and validates document data
  3. User takes a selfie for facial comparison
  4. System cross-references against watchlists and sanctions databases
  5. Verified badge is displayed on profile

This process reduced fraud incidents by 22% in markets where it was made mandatory.

Background Checks ​

Uber runs background checks on all driver-partners, including:

  • Social security number trace
  • National criminal database search
  • Sex offender registry check
  • Motor vehicle records review
  • Annual re-screening

These checks are processed through third-party providers like Checkr and typically complete within 3-5 business days.

Safety Features ​

Safety goes beyond fraud prevention to physical and emotional well-being of marketplace participants.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                  SAFETY FEATURE MATRIX                    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  Before Transaction β”‚  During Transaction                β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  - ID verification  β”‚  - In-app communication            β”‚
β”‚  - Profile reviews  β”‚  - GPS tracking (ride/delivery)    β”‚
β”‚  - Background check β”‚  - Emergency button (Uber)         β”‚
β”‚  - Insurance info   β”‚  - Live trip sharing               β”‚
β”‚  - Safety tips      β”‚  - Two-way ratings                 β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  After Transaction  β”‚  Ongoing                           β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  - Rating/review    β”‚  - Safety incident database        β”‚
β”‚  - Incident report  β”‚  - Policy updates                  β”‚
β”‚  - Insurance claim  β”‚  - Community education             β”‚
β”‚  - Follow-up check  β”‚  - Regulatory compliance           β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Insurance and Guarantees ​

  • Airbnb Host Protection Insurance: Up to $1 million in liability coverage for hosts. Airbnb also offers AirCover for guests, which provides booking protection, check-in guarantee, and a get-what-you-booked guarantee.
  • Uber: Carries commercial auto insurance that covers riders during trips, including $1 million in third-party liability.
  • eBay Money Back Guarantee: Buyers are protected if an item does not arrive or does not match the listing description.

Emergency Protocols ​

For marketplaces involving in-person interactions, emergency protocols are essential:

  1. In-app emergency button connected to local emergency services
  2. Automatic location sharing with designated emergency contacts
  3. Trip or appointment details shared with trusted contacts
  4. Incident response team available 24/7
  5. Post-incident support and follow-up procedures

The Trust and Safety Pipeline ​

The complete pipeline from detection through resolution operates as a continuous cycle.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚           TRUST AND SAFETY PIPELINE: DETECTION TO RESOLUTION     β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                                  β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”        β”‚
β”‚  β”‚  DETECTION   β”‚    β”‚   TRIAGE     β”‚    β”‚ INVESTIGATION β”‚        β”‚
β”‚  β”‚             β”‚    β”‚              β”‚    β”‚               β”‚        β”‚
β”‚  β”‚ - ML models  │───▢│ - Severity   │───▢│ - Evidence    β”‚        β”‚
β”‚  β”‚ - User reportβ”‚    β”‚   scoring    β”‚    β”‚   gathering   β”‚        β”‚
β”‚  β”‚ - Rule engineβ”‚    β”‚ - Auto-route β”‚    β”‚ - User contactβ”‚        β”‚
β”‚  β”‚ - Proactive  β”‚    β”‚ - Priority   β”‚    β”‚ - Context     β”‚        β”‚
β”‚  β”‚   scanning   β”‚    β”‚   queue      β”‚    β”‚   review      β”‚        β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜        β”‚
β”‚                                                  β”‚               β”‚
β”‚                                                  β–Ό               β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”        β”‚
β”‚  β”‚  FEEDBACK    β”‚    β”‚  ENFORCEMENT β”‚    β”‚   DECISION    β”‚        β”‚
β”‚  β”‚             β”‚    β”‚              β”‚    β”‚               β”‚        β”‚
β”‚  β”‚ - Model     │◀───│ - Warning    │◀───│ - Policy      β”‚        β”‚
β”‚  β”‚   retrainingβ”‚    β”‚ - Suspension β”‚    β”‚   application β”‚        β”‚
β”‚  β”‚ - Policy    β”‚    β”‚ - Ban        β”‚    β”‚ - Precedent   β”‚        β”‚
β”‚  β”‚   updates   β”‚    β”‚ - Legal ref  β”‚    β”‚   check       β”‚        β”‚
β”‚  β”‚ - Metric    β”‚    β”‚ - Restitutionβ”‚    β”‚ - Appeal      β”‚        β”‚
β”‚  β”‚   tracking  β”‚    β”‚              β”‚    β”‚   rights      β”‚        β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜        β”‚
β”‚                                                                  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Key Metrics for Trust and Safety ​

MetricTargetWhy It Matters
Fraud rate (% of GMV)< 0.1%Direct financial loss
Detection rate> 95%Catching known fraud patterns
False positive rate< 5%Legitimate users blocked incorrectly
Time to detect< 1 hourLimiting damage from active fraud
Time to resolve< 24 hoursUser confidence in platform response
Content moderation accuracy> 98%Correct policy application
Verification completion rate> 85%Users completing the verification flow
Safety incident rateDeclining quarterTrending in the right direction

In Practice ​

Real-World Examples ​

Airbnb: Layered Trust Architecture

Airbnb's trust and safety operations have evolved through hard lessons. After early incidents involving property damage and personal safety, they built a comprehensive system:

  • Verified ID required for booking in most markets (government ID plus selfie)
  • $1 million Host Protection Insurance (later expanded to AirCover)
  • 24/7 Neighborhood Support hotline for community concerns
  • Machine learning models that flag high-risk reservations (party risk, fraud risk)
  • A dedicated Trust team of over 300 people handling escalated cases

The result: Airbnb reports that less than 0.1% of stays involve a safety-related issue.

Uber: Real-Time Safety Systems

Uber invested heavily in real-time safety after public scrutiny over rider safety:

  • RideCheck detects unusual trip activity (unexpected stops, possible crashes) and proactively reaches out
  • Emergency button in the app connects to 911 with automatic location sharing
  • PIN verification ensures riders get in the correct vehicle
  • Continuous background check monitoring (not just at onboarding)
  • Safety transparency report published annually with incident data

eBay: Fraud Detection at Scale

eBay processes over 200 million listings and must detect fraud across a massive surface area:

  • Machine learning models evaluate every listing within milliseconds
  • Buyer protection through Money Back Guarantee reduces friction for new buyers
  • Seller performance standards with automatic enforcement (late shipment rate, defect rate)
  • VeRO (Verified Rights Owner) program for intellectual property protection
  • Collaboration with law enforcement for organized fraud rings

Anti-Patterns ​

  1. Verification theater: Collecting identity documents but never actually validating them. Users eventually discover the process is meaningless and trust erodes.

  2. Reactive-only posture: Waiting for user reports instead of proactive scanning. By the time a victim reports, the damage is done and the fraudster may have moved on.

  3. One-size-fits-all moderation: Applying the same rules globally without cultural context. Content that is acceptable in one market may be prohibited in another.

  4. Over-automation without human review: Fully automated systems generate false positives that frustrate legitimate users. Always maintain a human escalation path.

  5. Ignoring the supply side: Many marketplaces focus fraud prevention on buyers but neglect seller/provider safety. Providers face risks too β€” payment fraud, harassment, and property damage.

Common Mistakes ​

  • Launching without a trust and safety team or designated owner
  • Building verification flows with too much friction, causing abandonment
  • Not tracking false positive rates alongside fraud detection rates
  • Failing to plan for ban evasion (users creating new accounts)
  • Neglecting moderator well-being (content review burnout is real)
  • Storing sensitive verification data without proper security controls

Key Takeaways ​

  • Trust and safety is a core marketplace function, not a cost center. It directly impacts liquidity, retention, and brand value.
  • Layer your defenses: prevention, detection, response, and enforcement must all work together.
  • Fraud detection requires both automated systems (ML models, rule engines) and human judgment (trained moderators, investigators).
  • Identity verification depth should match your marketplace's risk profile β€” not every platform needs full KYC.
  • Safety features must cover the entire transaction lifecycle: before, during, and after.
  • Track both detection rates and false positive rates. Catching fraud is useless if you also block 20% of legitimate users.
  • Learn from incidents. Every fraud pattern and safety event should feed back into improved detection and policy.
  • Invest in your trust and safety team's well-being. Content moderation and fraud investigation are psychologically demanding roles.

Action Items ​

🏒 Owner:

  • ☐ Establish trust and safety as a dedicated function with executive sponsorship
  • ☐ Define risk tolerance levels for fraud rate, false positive rate, and response time
  • ☐ Budget for identity verification services, moderation tools, and staffing
  • ☐ Review insurance and guarantee programs quarterly against competitive benchmarks

πŸ’» Dev:

  • ☐ Build a real-time fraud scoring pipeline that evaluates listings and transactions at creation
  • ☐ Implement device fingerprinting and behavioral analytics for ban evasion detection
  • ☐ Integrate third-party identity verification APIs (Jumio, Onfido, or similar)
  • ☐ Create an internal moderation dashboard with queue management and decision logging

πŸ“‹ PM:

  • ☐ Document content policies and moderation guidelines with clear examples
  • ☐ Design escalation paths from automated detection through human review to resolution
  • ☐ Set and track SLAs for fraud detection time, moderation queue clearance, and incident response
  • ☐ Conduct quarterly reviews of fraud patterns and policy effectiveness

🎨 Designer:

  • ☐ Design verification flows that explain why each step is needed and show progress
  • ☐ Create reporting interfaces that are easy to find but do not clutter the core experience
  • ☐ Build trust indicators (verified badges, safety scores) that are visible at decision points
  • ☐ Design safety communications (alerts, warnings, incident follow-ups) with empathetic tone

Next: Dispute Resolution and Support

The Product Builder's Playbook