How Image Angel Can Help

Resources & Support

If your image was protected by Image Angel, we may be able to trace who accessed it before it was shared.

We don’t store your images. We don’t publish anything. Our role is to quietly provide proof, so platforms can act, and you can get answers.

We only release forensic evidence through secure, appropriate channels — to protect you and maintain accountability.

Trusted Support Services

The main organisations that can offer real, confidential help.

You are not alone. You are not at fault. And this is not the end of the story.

Cyber Civil Rights Initiative (USA)
cybercivilrights.org
Confidential support for USA adults who’ve experienced intimate image abuse.

Revenge Porn Helpline (UK)
 revengepornhelpline.org.uk
Confidential support for UK adults who’ve experienced intimate image abuse.

Frequently Asked Questions

About reporting an incident

Start by taking a breath. If you see your image somewhere unexpected, like in a Telegram group, private chat, or online forum, the first instinct can be to chase every link in panic.

If you’re in the UK, we recommend you contact one of the NGOs we work with (like The Revenge Porn Helpline, Refuge).

For worldwide help we recommend searching for local charities and organisations through the NOMORE Global Directory.

No. The system is based on facts. If the image carries a fingerprint and we can trace it back to a viewer, that’s enough for us – no further testimony required. Image Angel is only embedded into images that are sent and received in digital spaces that are considered to be private.

Only if you want them to be. The organisations and charities we work with are there to support you, no one will report law enforcement unless you explicitly request it or are in immediate danger.

If the image has been altered or redrawn by AI:
If it started as an Image Angel–protected image, partial data may still be recoverable. We attempt extraction regardless of compression or transformation.

If you’re not sure if the platform used Image Angel:
Send the image anyway. We’ll check.

If you don’t want to involve a platform at all:
That’s fine. We can log the fingerprint silently in case of future incidents.

If you want to report anonymously:
NGOs can act as your proxy.

If you change your mind mid-process:
You can pause or stop the process at any time.

The only part of the image that relates to you is the visual part. Your name or username is not embedded in the watermark, and we don’t need to know who you are.

That’s okay too. You’re in control.

About the technology

Thats totally fine, and part of the reason we exist!

We can help identify which platform the leak came from – that’s part of what the fingerprint reveals.

No. The fingerprint is invisible and designed to survive common edits, including cropping, screenshots, and visual adjustments like filters. It’s not something a user can easily see or strip away.

Yes. Image Angel is built to survive screenshots. The fingerprint is resilient enough to remain even when the image is captured and reshared. That’s what makes it different from traditional watermarks or metadata tags.

If your content was protected through a platform using Image Angel, yes — we may be able to trace who accessed it. The platform can request our help to identify the viewer based on the fingerprint, and respond appropriately.

Even if a user tries to hide behind a false profile, their access fingerprint can still identify them. The platform may be able to connect that access to a real email, payment method or device — and we provide evidence to support that.

Even if the image was cropped, compressed or screenshotted, our system can often recover the fingerprint. If we find one, it tells us:

  • Which platform the image came from
  • Which account viewed it
About Image Angel

No. Image Angel doesn’t keep copies of your images. We embed a fingerprint at the moment of access and store only encrypted data needed to verify it if something goes wrong.

No. We don’t track you. We trace images only when there’s a reason — like a report of a leak or misuse. The fingerprint is tied to the viewer, not the creator. Our goal is to hold the right person accountable, not monitor your self expression.

At the moment, no — Image Angel works at the platform level, not individual use. We partner with dating apps, adult platforms and content-sharing services to integrate our protection behind the scenes. You can always recommend us to platforms you use.

Yes. That’s the beauty of networked protection. You don’t have to guess. If the image was protected, we can scan it and tell which platform it was accessed on — and who by. It takes the burden off you.

Our system is built to be a network between all the platforms you might use. You don’t need to chase down multiple companies or remember which dating site or platform you sent an image through.

Yes. That’s the beauty of networked protection. You don’t have to guess. If the image was protected, we can scan it and tell which platform it was accessed on — and who by. It takes the burden off you.

What happens after a report?

They’ll listen.
They won’t pressure you to report, name names, or prove anything.

If you’re comfortable, they may ask for the original image and a copy or screenshot of the leaked image. They’ll then contact Image Angel on your behalf so you don’t have to.

With your permission, we contact the platform. We provide:

  • Proof that the image is watermarked
  • The identifier of the account or session that leaked it

The platform can then take steps internally – such as suspending the account, issuing a warning, or conducting their own investigation.

You decide. Some people want to be told every step. Others prefer not to know.

we will always keep the organisation who contacts us on your behalf informed. It’s then your choice to be contacted by them, all the time or only if further support is needed. You can even opt out of updates altogether.

That’s completely valid. We can work with your organisation to record the incident in case more evidence surfaces later. You are always welcome to return when you’re ready.

Absolutely not. Once we confirm the image contains a sharers details, you choose what happens next.

Your options include:

  • Requesting the platform to take action (warn, suspend, investigate the user).
  • Requesting legal support or to share evidence with law enforecement for future steps.
  • Choosing not to take any further action at all.
  • Asking us to quietly monitor future leaks and assist in building a case.

 

We provide evidence through your platform or (if applicable) legal routes. That ensures the process protects your rights without putting you in further danger. You will be informed of outcomes where possible, but never exposed to the perpetrator.

In the UK? Need help right now?

If you’re in the UK and your image has been shared without consent, or you’re afraid it might be, there is help available. We partner with the Revenge Porn Helpline for confidential, expert support.

Worldwide Support & Resources

For an always up-to-date directory of resources across the world; we partner with the NO MORE Global Directory.

Click on your part of the world to find your local domestic and sexual violence support services in almost every UN-recognized country and territory.