Report a Leak.

If your protected content has appeared somewhere it shouldn't, we're here to help you trace it.

What Happens Next.

1

Tell Us What Happened

Let us know where the content appeared and share whatever details you have. You don't need to have all the answers — just start with what you know.

2

We Analyse the Leak

Our team analyses the leaked file using the embedded forensic watermark. This identifies who accessed the content before it was shared.

3

You Receive a Forensic Report

We provide a forensic report with the session ID, timestamp, and platform of origin. This report can support platform enforcement, legal proceedings, or regulatory complaints.

Who are you?

What happened?

(encrypted at rest)

Additional context

You Don't Have to Go Through This Alone.

These organisations provide free, confidential support for people affected by image-based abuse:

Revenge Porn Helpline →

Support for victims of intimate image abuse

StopNCII →

Hash-matching tool to prevent sharing of intimate images

SafetyNet →

Technology safety resources for survivors

NNEDV →

National Network to End Domestic Violence

Our Wave →

Online resource for sexual assault survivors

Cyber Civil Rights Initiative →

Fighting for civil rights in the digital age

Prefer to reach us directly? Email hello@imageangel.co.uk. All reports are treated as confidential.