Case Study Summary
Amy's* experience of image abuse did not involve a partner or someone she knew personally. Instead, it began with a message from a friend and the sudden realisation that private content shared behind a paywall had escaped onto the open internet.
What followed was not just the loss of control over her images, but a prolonged struggle to understand how it happened, who was responsible, and what, if anything, she could do next.
*Names and identifying details have been changed to protect anonymity.
Content Shared with Clear Boundaries
Amy shared intimate images on a subscription website, which was limited to paying subscribers. She was explicit about her boundaries: her content was not to be screenshotted, shared, or redistributed in any form.
She never consented to her images being available for free or hosted on external websites. Like any creator, Amy's work was behind a paywall because that would provide income here. That expectation was broken without warning.

The Moment of Discovery
Amy first became aware of the leak when a friend, also a sex worker, reached out to warn her that images were appearing on third-party websites. What she found was overwhelming: large volumes of her private content circulating freely, often under slightly altered site names.
But she could not make the key discovery โ she did not know who had first posted the images, how they had been taken, or how widely they had already spread. As she later described, the moment of finding out was marked by panic and confusion, a sudden need to grasp knowns that simply would not come.

Exposure Beyond Consent
The leaked material did not stop at the images themselves. Amy discovered that the leaked content had been linked not only to her pseudonym and stage name, but to her username, and her full legal name.
She described this as "terrifying", a permanent connection between her sex work and her legal identity. It increased her sense of vulnerability far beyond the original leak. What had been a controlled environment became something entirely uncontrolled.

The Search for Accountability
Amy attempted to report the leaked content to the platform where she'd originally shared it, but was met with little support. Without being able to identify the specific subscriber responsible, there was nothing that could be done.
She also tried to have the images removed from third-party sites hosting the content. But those takedown requests were slow, incomplete, and ultimately futile โ the content simply reappeared elsewhere. She found herself locked into an endless cycle of reporting with no end in sight.
The absence of forensic evidence meant there was no trail to follow, no proof of who had first taken the images or distributed them. Without that, Amy was left powerless.

What Forensic Watermarking Could Have Changed
When Amy was shown how forensic watermarking works, her reaction was immediate. If her images had been embedded with imperceptible identifiers that linked each copy to a specific subscriber, she would have known exactly who was responsible.
That evidence could have been used to hold the subscriber accountable โ through the platform, or through law enforcement. It would have also provided the platform itself with proof sufficient to take action: removing the subscriber, supporting prosecution, or providing a deterrent effect to others.
For Amy, the significance was not just technical. She described forensic watermarking as "really important" โ a tool that would have given her back the power that was taken from her. Being able to identify the person responsible would have transformed a situation defined by helplessness into one where action was possible.
The Broader Impact on Trust and Safety
Amy's case is not isolated. Paywalled content platforms host millions of creators who depend on the integrity of those boundaries. When leaks occur without accountability, the trust between platform, creator, and subscriber breaks down.
Forensic watermarking offers a way to restore that trust. It provides evidence where none existed before. It creates accountability where there was only uncertainty. And it places control back in the hands of those who had it taken away.
For platforms, it is not just a compliance tool. It is a commitment to the people whose content they host, and a defence against the reputational and legal consequences of failing to act.
