What do you do if someone is
threatening to share your
intimate images?

You are not alone

Are you worried someone might share your intimate images online? Has this already happened to you?

Founded in 2015, the Revenge Porn Helpline (RPH) has supported thousands of victims of non-consensual intimate image abuse.

What is StopNCII.org?

StopNCII.org is a free tool designed to support victims of Non-Consensual Intimate Image (NCII) abuse.

The tool works by generating a hash from your intimate image(s)/video(s). Image hashing is the process of using an algorithm to assign a unique hash value to an image. Duplicate copies of the image all have the exact same hash value. For this reason, it is sometimes referred to as a ‘digital fingerprint’. StopNCII.org then shares the hash with participating companies so they can help detect and remove the images from being shared online. Learn more about the tool and participating companies.

With an over 90% removal rate, RPH has successfully removed over 200,000 individual non-consensual intimate images from the internet.

StopNCII.org is operated by the Revenge Porn Helpline which is part of SWGfL, a charity with an international reputation that believes that everyone should benefit from technology, free from harm. Founded in 2000, SWGfL works with a number of partners and stakeholders around the world to protect everyone online.

The Revenge Porn Helpline (RPH) — established in 2015 — has supported thousands of victims of non-consensual intimate image abuse. With an over 90% removal rate, RPH has successfully removed over 200,000 individual non-consensual intimate images from the internet.

Remember, everything you are feeling is valid. You are a victim of abuse.

We protect your privacy

The tool works by creating hashes (digital fingerprints) of your selected images directly on your device. This fingerprint is the only file which is shared with StopNCII.org and participating companies. StopNCII.org does not download the images from your device and we collect minimal data to run the service to help protect your privacy.

Read our privacy policy

Who is StopNCII.org for?

My images are not yours to share.

How StopNCII.org works?

  1. Select the intimate image(s)/video(s) you want hashed from your device.
  2. For each piece of content, StopNCII.org will generate a digital fingerprint, called a
    ‘hash’ on your device. Only the hash is sent to StopNCII.org, the associated image or
    video remains on your device and is not uploaded.
  3. If your case is created successfully, you will receive a case number to check your case status – remember to make a note of your case number along with the PIN, to access your case after it is submitted. This is not recoverable.
  4. Participating companies will look for matches to the hash and remove any matches within their system(s) if it violates their intimate image abuse policy.
  5. You can use your case number anytime to check the progress on your case, or if you wish to withdraw your participation.

Questions?
Please check our FAQ.

Testimonials

Menu