Our technology at a glance

Reducing the circulation of intimate image abuse through technology.

Our technology is designed to provide image sharing platforms with more than just a layer of protection. We’re dedicated to safeguarding digital privacy.

A robust deterrent and solution to unauthorised image distribution, supporting a more secure digital landscape.

Unique, traceable

Auxiliary data cannot be altered without detection.

On-demand

 This ensures that the original, untracked image is never exposed to the end user.

Encrypted

URL is encrypted with AES-256 in GCM mode, ensuring that it cannot be tampered with or exposed to unauthorized users.

What Image Angel Does

  • Embeds invisible, traceable watermarks
    Every image viewed is fingerprinted at access — not upload.

  • Identifies the source if content is leaked
    Makes it possible to trace abuse back to a specific viewer.

  • Triggers forensic investigation on violation
    No noise. No guesswork. Just proof when it matters.

  • Integrates at platform level via API
    Built for infrastructure, not individuals.

  • Works in under 200ms
    Fast enough for seamless delivery. Strong enough for legal evidence.

  • Enables discreet resolution
    Survivors and platforms can act without public exposure.

  • Supports regulatory compliance
    Aligns with OSA, DSA, and AB-3211 — reducing risk for platforms.

  • Backs up education and trust strategies
    Lets platforms support ethical digital intimacy with real consequences for breaches.

  • Protects revenue and platform reputation
    Stops content misuse before it damages users — or the brand.

  • Scales with platform growth
    Pricing is usage-based and designed for B2B SaaS flexibility.

What Image Angel Doesn’t Do – By Design

  • No installation or opt-in required
    Users are protected automatically. No downloads, permissions or tech knowledge needed.

  • Doesn’t shame, restrict or moralise
    We don’t punish digital intimacy. We protect it.

  • No tracking, profiling or surveillance
    We don’t follow user behaviour. We only act when abuse is reported.

  • Doesn’t expose uninvolved users
    Forensic tracing targets only the source; not the bystanders.

  • No changes to user experience
    The watermark is invisible and does not alter the image or interrupt interaction.

  • Doesn’t require users to report content
    Platforms receive proactive signals when protected content is leaked.

  • No visible watermark or metadata
    Protection is server-side. It cannot be removed, cropped, or detected.

  • Doesn’t rely on AI flagging or content filters
    It’s not guessing what might be harmful; it proves what happened, when, and by whom.

  • Doesn’t store personal data
    Fingerprints link to access logs already held by the platform. We don’t collect or retain identifying info.

Forensic proof

The development and operation of Image Angel’s on-demand protection system involves a combination of advanced technologies across several areas. These include image processing, cryptography, and cloud infrastructure.