It is possible to address child exploitation online while preserving user privacy—the principles and tools just need to be applied across the board.