New Benchmark
Your Content. Your Boundaries.

You stay in control. Always.
- If someone shares your content without permission, we can help find out who it was.
- The fingerprint remains robust against editing, downloading and screenshots .
- We support your platform in taking action. We work fast, discreetly, and with evidence.
Help I think my image has been leaked!
Start by taking a breath. If you see your image somewhere unexpected, like in a Telegram group, private chat, or online forum, you don’t need to chase every link or panic.
If you’re in the UK, we recommend you contact one of the NGOs we work with (like The Revenge Porn Helpline, Refuge).
For worldwide help we recommend searching for local charities and organisations through the NOMORE Global Directory.
What if I shared the image on multiple platforms?
Thats totally fine, and part of the reason we exist!
We can help identify which platform the leak came from – that’s part of what the fingerprint reveals.
What happens after I contact a charity or safety organisation?
They’ll listen.
They won’t pressure you to report, name names, or prove anything.
If you’re comfortable, they may ask for the original image and a copy or screenshot of the leaked image. They’ll then contact Image Angel on your behalf so you don’t have to.
How do you know if the image is protected?
Even if the image was cropped, compressed or screenshotted, our system can often recover the fingerprint. If we find one, it tells us:
- Which platform the image came from
- Which account viewed it
Do I have to take legal action if a match is found?
Absolutely not. Once we confirm the image was protected, you choose what happens next.
Your options include:
- Requesting the platform to take action (warn, suspend, investigate the user)
- Requesting legal support or evidence for future steps
- Choosing not to take any further action at all
- Asking us to quietly monitor future leaks and assist in building a case
Can I stay anonymous during all this?
Yes. The only part of the image that relates to you is the visual part. Your name or username is not embedded in the watermark, and we don’t need to know who you are. You can stay anonymous through the NGO.
What happens if I want the platform to take action?
With your permission, we contact the platform. We provide:
- Proof that the image is watermarked
- The identifier of the account or session that leaked it
The platform can then take steps internally – such as suspending the account, issuing a warning, or conducting their own investigation.
Can I be updated about what happens, or stay out of it?
You decide. Some people want to be told every step. Others prefer not to know.
we will always keep the organisation who contacts us on your behalf informed. It’s then your choice to be contacted by them, all the time or only if further support is needed. You can even opt out of updates altogether.
What happens if I don’t want anything done right now?
That’s completely valid. We can work with your organisation to record the incident in case more evidence surfaces later. You are always welcome to return when you’re ready.
Will I have to prove the image is mine?
No. The system is based on facts, not feelings. If the image carries a fingerprint and we can trace it back to a viewer, that’s enough for us – no further testimony required. Image Angel is only embedded into images that are sent and received in digital spaces that are considered to be private.
Is this a legal process? Will the police be involved?
Only if you want them to be. The organisations and charities we work with are there to support you, no one will report law enforcement unless you explicitly request it or are in immediate danger.
Alternatives and Edge Cases
If the image has been altered or redrawn by AI:
If it started as an Image Angel–protected image, partial data may still be recoverable. We attempt extraction regardless of compression or transformation.
If you’re not sure if the platform used Image Angel:
Send the image anyway. We’ll check.
If you don’t want to involve a platform at all:
That’s fine. We can log the fingerprint silently in case of future incidents.
If you want to report anonymously:
NGOs can act as your proxy.
If you change your mind mid-process:
You can pause or stop the process at any time.
Trace Every Violation
Invisible IDs stay within the content, even if it's edited or filtered
Action-Ready Proof
Audit trails support platform and legal action with digital forensic level confidence.
You're in Control
We're built by survivors for survivors. It's always up to you to decide when to act.

Why It Matters
Consent isn’t a grey area.
Non-consensual sharing of content is abuse. Whether it’s a screenshot, a live stream recording or a video, we believe creators deserve to be backed by real consequences. Not silence.
Image misuse is a violation, and it's one victims are often shamed for. This needs to change. We built Image Angel to help make that change - with powerful, invisible tech that leaves a trail.
Built By Survivors
Built from experience and working with platforms that are ready to protect you, not just profit from you.
Backed Up By Evidence
Our technology creates friction for abusers and proof for platforms. So you’re not left defending yourself alone.

We Are Fast
Want your platform to use Image Angel?
Enter your details and we’ll send you a message you can forward to any platform, written in language they can’t ignore.
