Today : Jul 09, 2025
Technology
17 April 2025

New Tool StopNCII Aims To Combat Digital Extortion

The innovative StopNCII initiative protects users from online threats without uploading private content.

In the current digital age, electronic extortion has emerged as a widespread phenomenon, particularly with the extensive use of the Internet and social media. Many individuals, especially women and girls, have fallen victim to extortion tactics that involve threats to publish personal images or videos that could destroy their social and professional lives. To combat this growing issue, an innovative and effective tool called "StopNCII" has been introduced, allowing users to protect their privacy without needing to upload their private photos or videos online.

Electronic extortion, often referred to as digital extortion, is a crime that typically occurs online. In these cases, perpetrators threaten their victims by promising to publish sensitive images or videos in exchange for money or further compromising material. This practice is considered a serious crime in many countries. International reports indicate that this phenomenon is on the rise, particularly among girls and teenagers. Such reports suggest that extortionists often employ psychological threats to intimidate victims and exploit their fear of public shame.

The "StopNCII" initiative provides a revolutionary solution to combat digital extortion. This tool was developed as part of a global campaign launched by the British organization Revenge Porn Helpline in collaboration with Meta, the parent company of Facebook and Instagram. The core concept of the tool is that it does not require users to upload their images or videos to the Internet. Instead, it converts these files into a digital hash, which is sent to major social media platforms like Facebook, Instagram, Twitter, and TikTok to prevent the content from being published.

How does the tool work? First, users visit the official "StopNCII" website. Next, they answer nine short questions that clarify the type of report being made. After that, they upload the original version of the image or video from their device (without ever leaving their device). The site then converts the file into a digital hash and sends it directly to the collaborating platforms. These platforms subsequently block any matching content and prevent its future re-publication.

One of the most notable features of the StopNCII tool is that it ensures complete privacy for the user, as it does not share or store images online. The process is incredibly quick, with reports submitted in less than a minute. Additionally, the tool continuously monitors the Internet, meaning it prevents any previously blocked content from being republished. Supported by major tech companies and international legal organizations, the tool also provides legal assistance to users.

Who can use this tool? It targets anyone facing digital threats related to their personal images or videos. It is particularly beneficial for women and girls who have experienced the leaking of their private images or have been victims of digital betrayal. Additionally, teenagers who may have shared private images in the past and are now at risk of exploitation can also benefit from this tool. Anyone concerned about their digital privacy can use this tool as a means of self-protection.

Digital extortion is a crime punishable by law, and victims can file official reports with Internet crime-fighting units. Digital evidence, such as messages, images, and conversations, is legally recognized by the public prosecutor's office. Therefore, it is crucial for victims to muster the courage to approach legal authorities without fear of the perpetrator.

Privacy is a right, not a luxury. Silence and secrecy surrounding issues of digital extortion are among the main reasons that empower perpetrators to continue their crimes. However, with digital protection tools like "StopNCII," victims can now safeguard themselves and push digital extortion out of their lives. If privacy is a right for everyone, then digital security must be an essential part of that right. By utilizing this tool, anyone can take a strong step towards protecting their privacy and preventing its violation.

Meanwhile, the WhatsApp application stands out as one of the most widely used messaging applications globally, renowned for its end-to-end encryption feature that ensures the privacy of conversations, preventing third parties, including the application management itself, from accessing them. However, there are several additional security settings that users can manually enable to enhance their level of security and protection.

In a report by Computer Hoy, five hidden features in WhatsApp are highlighted that cybersecurity experts recommend enabling to better protect data and conversations. The first feature is to lock private chats. Users can activate the "Lock Chats" option by tapping the three dots at the top of the application, then selecting: Settings -> Privacy -> Lock Chats. When enabling this for the first time, users will be prompted to create a secret code, which will be used later to view or search for locked chats.

Another suggested feature is to restrict access to personal information, such as profile pictures, last seen, and status updates. Users are advised to limit who can see these details by going to: Settings -> Privacy -> Who can see my personal information, and selecting "My Contacts" for all options. This simple step protects users from phishing and fraud attempts that may target app users by exploiting visible information.

Additionally, users can enable disappearing messages, which can be set to delete themselves automatically after 24 hours, 7 days, or 90 days, providing extra privacy, especially in sensitive conversations. To activate this feature, users should navigate to: Settings -> Privacy -> Disappearing Messages -> choose the appropriate duration. It is worth noting that this feature applies only to new conversations after activation and does not include previous chats.

Furthermore, while WhatsApp conversations are encrypted, backups stored in Google Drive or iCloud are not encrypted by default. To secure them, users should enable end-to-end encryption by going to Settings -> Chats -> Backup -> End-to-End Encrypted Backup, and then create a password or encryption key. This action prevents access to the backup even by WhatsApp itself.

Lastly, protecting one's IP address using a trusted VPN is crucial, as the IP address reveals geographical location and digital identity. Using a VPN not only protects the IP address but also enhances connection encryption and reduces tracking chances, particularly when using public Wi-Fi networks. Although some of these steps may seem simple, activating them can make a significant difference in safeguarding accounts and personal data. As electronic risks continue to rise, digital security is no longer an option but a necessity.