But they don't publish how they do this, because as soon as it's published, it can be trivially worked around.
The whole thing is so dumb, I imagine the owner of the company that does it is probably in the Epstein files. So basically he's making hashes of the files that he himself is creating.