LifestyleStrengthening our efforts against the spread of non-consensual intimate...

Strengthening our efforts against the spread of non-consensual intimate images


- Advertisment -
  • Together with more than 50 non-governmental organization partners around the world, Meta is supporting UK Revenge Porn Helpline’s launch of to help stop the non-consensual sharing of intimate images (NCII) on the internet.
  • This platform empowers people around the globe to proactively thwart the non-consensual sharing of their intimate images on participating tech companies’ platforms, giving victims more control and security over their images. 
  • has been built with safety, security and privacy at the forefront of every step of the process. The platform uses technology that hashes images and videos directly on a person’s device, so those images or videos never have to leave a person’s possession.

The non-consensual sharing of intimate images (NCII) — sometimes unfortunately referred to as “revenge porn” — can have a devastating impact on a person’s life. We do not allow this content on our apps, and today, we’re building on our industry-leading efforts to combat the spread of NCII on our platforms and beyond. 

Today, Meta and Facebook Ireland are supporting the launch of with the UK Revenge Porn Helpline and more than 50 organizations across the world. This platform is the first global initiative of its kind to safely and securely help people who are concerned their intimate images (photos or videos of a person which feature nudity or are sexual in nature) may be shared without their consent. The UK Revenge Porn Helpline, in consultation with Meta, has developed this platform with privacy and security at every step thanks to extensive input from victims, survivors, experts, advocates and other tech partners. 

The Security and Privacy Behind

When someone is concerned their intimate images have been posted or might be posted to online platforms like Facebook or Instagram, they can create a case through to proactively detect them. 

The tool features hash-generating technology that assigns a unique hash value (a numerical code) to an image, creating a secure digital fingerprint. Tech companies participating in receive the hash and can use that hash to detect if someone has shared or is trying to share those images on their platforms.

While participating companies use the hash they receive from to identify images that someone has shared or is trying to share on their platforms, the original image never leaves the person’s device. Only hashes, not the images themselves, are shared with and participating tech platforms. This feature prevents further circulation of that NCII content and keeps those images securely in the possession of the owner. 

- Advertisement - is for adults over 18 years old who think an intimate image of them may be shared, or has already been shared, without their consent. For people who are under 18, there are other resources and organizations that can offer support, including the National Center for Missing & Exploited Children (NCMEC). 

Global-Serving Footprint is available to people all over the world. It will be operated by the UK Revenge Porn Helpline, an organization that has helped thousands of NCII survivors and removed over 90% of the content reported to it since its founding in 2015. International NGO partners are critical to expanding the fight against this abuse and supporting victims wherever they are, and there are more than 50 joining us today. These organizations will now utilize to help local victims take back control of their intimate images online. 

“ represents a sea-change in the way those affected by intimate image abuse can protect themselves. At the heart of the work developing this tool have been the needs of victims and survivors by putting them in control without having to compromise their privacy. has been designed to be simple and easy to use, with detailed signposting to additional support and advice, giving back agency at a time when someone may feel utterly powerless. The team at the Revenge Porn Helpline have brought their years of experience working with victims in the UK to the development of and we are very grateful for the support of Meta in funding and technical expertise to support this new platform. We are looking forward to welcoming new partners to the platform and seeing it evolve, ensuring that for millions around the world, what was intended to be private, stays private.” – Sophie Mortimer, Revenge Porn Helpline Manager, SWGfL builds on technology developed by Facebook and Instagram’s NCII Pilot, which began in 2018 to help victims proactively stop the proliferation of their intimate images — not just remove them after the fact. For years, we’ve been using photo- and video-matching technology to remove intimate images shared without consent, encouraging people who use our services to report this type of behavior or content, and offering resources to better support victims. Throughout this time, we’ve heard from victims and experts about the need for a stronger platform adopted across the tech industry that puts the victim first. By allowing potential victims to access the hashing technology directly, gives them more agency, protects the privacy of their images and opens the door for other companies to participate in this effort. This new platform features even greater safety, privacy and security to help victims take back control.  

“At Bumble, we believe the internet should be safe and empowering for all people. Meta’s initiative and support for NGOs on the frontlines in the fight against intimate image abuse is a concrete step toward that goal.” – Lisa Roman, Vice President of Public Policy, Bumble (Updated on December 6, 2021 at 1:10PM PT to include additional third-party support.)

We will continue to build on these tools to address user feedback and work with partners to ensure the effectiveness of this technology and approach. To learn more, visit 

NOW WITH OVER +8500 USERS. people can Join Knowasiak for free. Sign up on
Read More

- Advertisement -


  1. I hope the technology can help in cases like the one described here:…

    A danish tourist was killed on holiday and it was filmed (very graphic) and now the parents of the deceased are being sent videos.

    > She said she had reported every instance of the harassment to Facebook but in a number of cases it had left the video online. She also complained that Danish police had failed to identify the culprit.

    > Simon Kollerup, 35, the Danish trade minister responsible for internet regulation, said Facebook’s “hopeless” response had underscored the need for more stringent EU rules on social media.

    > Martin Ruby, 48, Facebook’s head of public policy for the Nordic and Benelux regions, said he was sorry “if we made the wrong calls in this case” but insisted that it had done its best to eradicate the execution clips. He said that the code for the videos was being continually tweaked to elude Facebook’s censorship algorithms. “The problem is that these evil people are sitting there and changing the format on them,” he told DR. “It’s a perpetual battle.”

  2. So what stops someone from uploading an image that isn't NCII as an attempt to censor an image or get whoever shared the image in trouble? I imagine there needs to be human oversight in some way to stop abuse. But does that mean that in order to stop the spread of your personal NCII, you need to proactively share those exact same photos you are worried about getting shared?

You might also likeRELATED
Recommended to you

GitHub Copilot Labs

Greetings! You may have noticed some cool new...

Turing Pi 2: 4 Raspberry Pi nodes on a mini ITX board

Last year I spent a bit of time building a Kubernetes cluster with the original Turing Pi. It was fun, and interesting, but ultimately the performance of the Compute Module 3+ it was designed around led me to running my homelab off some newer Pi 4 model B computers, which are at least twice as…

Show HN: Ansible Doc Generator – Easy documentation for your Ansible roles

CLI for documenting Ansible roles into Markdown files. Documentation is generated from magic comments declared in the tasks file of a role, where every comment should be put before the declaration of the task. These are the types of comments accepted: @metatitle defines a high level title (equivalent to h2). It's expected to be just…

Google launches Ripple, an open standard to bring tiny radars to cars and more

Google has been publicly building tiny radar chips since 2015. They can tell you how well you sleep, control a smartwatch, count sheets of paper, and let you play the world’s tiniest violin. But the company’s Soli radar hasn’t necessarily had commercial success, most prominently featuring in an ill-fated Pixel phone. Now, Google has launched…
- Advertisement -

Must read


dwm is a dynamic window manager for X. It manages windows in tiled, monocle and floating layouts. All of the layouts can be applied dynamically, optimising the environment for the application in use and the task performed. In tiled layout windows are managed in a master and stacking area. The master area contains the window…
- Advertisement -