Free Tools to Stop Your Images from Spreading
StopNCII.org and Take It Down let you create digital fingerprints of intimate images so platforms can automatically block them—without uploading your photos.
What if platforms could automatically detect and block your intimate images before they spread—without you having to upload those images anywhere? That's exactly what StopNCII.org and NCMEC's Take It Down tool do. Here's how to use them.
How These Tools Work
Both tools use the same basic principle: hashing. Instead of uploading your actual images, you create a digital "fingerprint" (hash) of each image on your own device. This hash is just a string of characters—it can't be used to recreate your image.
You submit only the hash to participating platforms. They check uploads against their database of hashes. If someone tries to upload your image, the platform automatically blocks it.
What This Means for Privacy
- Your actual images never leave your device
- Platforms only receive the hash (digital fingerprint)
- The hash cannot be reversed to recreate your image
- Your identity is protected
StopNCII.org
StopNCII (Stop Non-Consensual Intimate Images) is a project by the UK Revenge Porn Helpline, in partnership with Meta and other tech companies.
How to Use StopNCII.org
- Go to StopNCII.org in a private browser window
- Select your images from your device (they're not uploaded)
- Generate hashes — this happens locally on your device
- Submit the hashes with a case number
- Participating platforms will check against these hashes
Participating Platforms
As of late 2024, StopNCII hashes are used by:
- TikTok
- Bumble
- Snap
- Threads
- Niantic
- OnlyFans
More platforms join regularly.
Limitations
- You must be 18+ to use it
- Only works on participating platforms
- Doesn't help with content already uploaded (only blocks future uploads)
- Doesn't work if someone edits the image (cropping, filtering changes the hash)
- Doesn't cover AI deepfakes (unless you have the specific deepfake file)
Take It Down (NCMEC)
Take It Down is run by the National Center for Missing & Exploited Children (NCMEC). It's specifically designed for people under 18, but anyone can use it.
How It Works
Similar to StopNCII—you generate hashes locally, and they're shared with participating platforms to proactively block uploads.
Key Differences from StopNCII
- Specifically supports minors (under 18)
- Run by NCMEC (US-based)
- May have different participating platforms
When to Use These Tools
Proactive Protection
If someone has your intimate images and you're worried they might share them:
- Use StopNCII/Take It Down immediately
- This prevents the images from being uploaded to participating platforms
- Even if the person tries to share them, they'll be blocked
After a Leak
If images are already circulating:
- Still use these tools to prevent further spread
- Also report existing content directly to platforms
- File with Google to remove from search results
What These Tools Can't Do
- Remove content that's already uploaded
- Work on non-participating platforms (especially Telegram, many smaller sites)
- Block edited versions of your images
- Identify who's trying to upload your content
Using Both Tools Together
StopNCII and Take It Down have overlapping but different participating platforms. For maximum protection:
- Use StopNCII.org first (broader platform coverage)
- Also use Take It Down (especially if you're under 18)
- Keep your case numbers safe—you may need them later
Privacy Concerns?
We understand the hesitation. Here's what these services genuinely can and can't see:
| They CAN See | They CANNOT See |
|---|---|
| The hash (fingerprint) | Your actual images |
| Your email (optional) | Your identity (unless you provide it) |
| Number of images hashed | Content of the images |
The hashing happens entirely on your device. Your images never leave your computer or phone.
A Note on Effectiveness
These tools are powerful but not perfect. They work best as one part of a broader strategy:
- Prevention: Hash your images with StopNCII/Take It Down
- Removal: Report any existing content to platforms
- De-indexing: File with Google to remove from search
- Monitoring: Set up alerts to catch new uploads
Need Comprehensive Protection?
We help victims use these tools and handle all platform reporting, Google removal, and ongoing monitoring. Everything stays confidential.
Get Help Now →About the Author
Sarah focuses on helping victims navigate the content removal process. She writes about digital rights, platform policies, and the legal landscape around non-consensual imagery.