What to Do if Someone Posts Your Nudes: A Step-by-Step Guide


If someone posts your nudes, shares an intimate video, threatens to leak private photos, or creates an AI-generated nude image of you, take a deep breath first. This is there are real steps you can take to protect yourself, report the abuse, and push for removal.

This guide explains what to do if someone posts your nudes without consent, how to preserve evidence safely, where to report nonconsensual intimate images, and how to get emotional, legal, and practical support. The goal is not panic. The goal is control.

What Counts as Nonconsensual Intimate Image Sharing?

Nonconsensual intimate image sharing is when someone takes, posts, sends, sells, threatens to share, or redistributes a nude, sexual, partially nude, or intimate image of you without your permission. It may also be called nonconsensual intimate imagery, image-based sexual abuse, nonconsensual pornography, intimate image abuse, or “revenge porn.” Many advocates avoid the phrase “revenge porn” because it can make the abuse sound like drama between exes. It is not drama. It is a privacy violation and, in many cases, a crime.

It can include a former partner posting private photos, a stranger using sextortion threats, someone sending your images in a group chat, a hacker leaking files from your cloud account, or a person using AI tools to create fake nude images that look like you. Whether the image is real, edited, or generated, the harm is real.

Step 1: Check Your Immediate Safety

Before you chase screenshots, takedown forms, or angry texts, pause and ask: “Am I physically safe?” If the person posting your images is also threatening violence, stalking you, sharing your address, contacting your family, or pressuring you to meet in person, prioritize safety first.

Move to a safe location if you can. Tell a trusted friend, roommate, parent, counselor, advocate, or coworker what is happening. If you believe someone may show up at your home, school, or workplace, call emergency services or local law enforcement. If the abuser is a current or former partner, consider contacting the National Domestic Violence Hotline or a local domestic violence organization for safety planning.

Do not handle this alone just because the internet makes everything look like a solo mission. This is not a video game side quest. You are allowed to have backup.

Step 2: Do Not Pay, Bargain, or Send More Images

If the person is threatening to post more images unless you pay money, send more photos, meet them, or obey demands, that is sextortion. The safest general rule is: do not pay, do not send more images, and do not negotiate. Paying often encourages more demands. Sending more content gives the abuser more material. Bargaining can keep you trapped in a cycle of fear.

Instead, stop direct engagement if it is safe to do so. Save the messages. Block or mute after evidence is preserved. Report the threats to the platform and, when appropriate, to law enforcement or the FBI’s Internet Crime Complaint Center. If the victim is a minor, involve a trusted adult and report to NCMEC.

Step 3: Preserve Evidence Before It Disappears

Your first instinct may be to delete everything, throw your phone into a lake, and become a mysterious person who only communicates by carrier pigeon. Understandablebut first, collect evidence. Evidence can help platforms remove content, support police reports, strengthen legal claims, and show a pattern of harassment.

What to Save

  • Screenshots of the post, profile, username, comments, captions, and direct messages
  • The full URL of the post or website page
  • The date and time you found it
  • The platform name, account handle, and profile link
  • Any threats, demands, payment requests, or blackmail messages
  • Names of people who saw, received, shared, or commented on the content
  • Emails, phone numbers, wallet addresses, or payment details used by the abuser

When possible, capture the entire screen so the platform name, timestamp, and account identity are visible. If you are too overwhelmed, ask a trusted person to help document the evidence. Avoid downloading, forwarding, or resharing explicit imagesespecially if the person in the image was under 18 when it was created. In those cases, report through child-safety channels instead of circulating the file.

Step 4: Report the Content to the Platform

Most major platforms prohibit nonconsensual intimate images. Instagram, Facebook, TikTok, X, Reddit, Snapchat, Google, and other services have reporting paths for intimate image abuse, sexual exploitation, privacy violations, or harassment. Use the platform’s in-app reporting tool and look for categories such as “nonconsensual intimate image,” “sexual abuse,” “privacy violation,” “harassment,” “blackmail,” or “minor safety.”

When you report, include the exact post link, explain that the content shows you or appears to show you without your consent, and mention any threats or repeated uploads. If the image is AI-generated or manipulated, say that clearly. Do not write a 12-page courtroom speech. Keep it factual: “This is an intimate image of me posted without my consent. I am the person depicted. Please remove it and preserve the account information for investigation.”

Example Platform Report Message

“This post contains an intimate image of me shared without my consent. I did not authorize this upload or distribution. The account has also threatened to share more images. Please remove the content, review the account for nonconsensual intimate imagery, and prevent identical copies from being reposted.”

Step 5: Use StopNCII or Take It Down

If you are 18 or older, StopNCII.org can help reduce the spread of nonconsensual intimate images on participating platforms. The tool creates a digital fingerprint, called a hash, from the image or video on your device. The image itself does not need to be uploaded to the service. Participating companies can use the hash to detect and block matching copies.

If you were under 18 when the image or video was created, use NCMEC’s Take It Down service. It is designed to help remove or prevent the spread of nude, partially nude, or sexually explicit photos or videos taken before someone turned 18. You can also report child sexual exploitation through NCMEC’s CyberTipline.

These tools are especially useful when you are worried the image may spread beyond one post. They are not magic erasers, but they are strong “do not repost this” signals to participating platforms.

Step 6: Ask Search Engines to Remove Results

Removing a post from a website is different from removing it from search results. A website may host the image, while Google or another search engine simply displays the page in results. You may need to do both.

Google allows people to request removal of personal explicit content from Search, including nonconsensual intimate images and some fake or AI-generated sexual images. This does not always remove the content from the original website, but it can make it much harder to find. If a website removes the image but search results still show old previews, request a refresh or outdated content removal.

Step 7: Report to Authorities When Appropriate

In the United States, many states have laws against sharing intimate images without consent, and some laws also cover threats to share those images. Federal law also addresses certain nonconsensual intimate images, including some AI-generated or altered sexual depictions, and requires covered platforms to maintain removal processes for qualifying content.

You may consider reporting to local law enforcement, the FBI’s Internet Crime Complaint Center, the FTC, or NCMEC if a minor is involved. If the person is blackmailing you, demanding money, impersonating you, stalking you, or threatening physical harm, reporting becomes even more important.

When filing a report, bring your evidence folder: screenshots, URLs, usernames, messages, dates, and any identifying details. If an officer or intake person seems unfamiliar with the issue, use clear terms like “nonconsensual intimate image distribution,” “sextortion,” “cyberstalking,” “harassment,” or “image-based sexual abuse.”

Step 8: Consider Legal Help

A lawyer can help you understand your options, which may include cease-and-desist letters, protective orders, civil claims, copyright takedown requests, or communication with platforms. Laws vary by state, and the best strategy depends on who posted the image, where it appeared, how it was obtained, whether threats were made, and whether the person depicted was under 18.

If you took the photo yourself, you may also own the copyright, which can sometimes support a DMCA takedown request. This is not the only route, and it is not always the right route, but it can be useful when websites ignore privacy complaints. A victim advocate or attorney can help you decide what is safe and effective.

Step 9: Secure Your Accounts and Devices

Sometimes intimate images are posted by someone who already has access to your phone, cloud storage, social media, email, or old shared accounts. Do a security check immediately.

Quick Digital Safety Checklist

  • Change passwords for email, cloud storage, social media, and banking apps
  • Turn on two-factor authentication
  • Log out of all devices you do not recognize
  • Check account recovery emails and phone numbers
  • Review connected apps and remove suspicious access
  • Turn off shared albums, shared location, and old device access
  • Scan devices for spyware if an abusive partner may be monitoring you

If you think your device is being monitored, use a safer phone or computer before researching help. A public library computer, a friend’s phone, or a work device may be safer depending on your situation.

Step 10: Protect Your Mental Health

Having intimate images shared without consent can trigger shame, panic, anger, insomnia, embarrassment, and fear. None of those reactions mean you are weak. They mean your privacy was violated. Your brain is trying to protect you, even if it is currently acting like a smoke alarm next to burnt toast.

Talk to someone safe. Contact RAINN’s National Sexual Assault Hotline, a local sexual assault center, a therapist, a campus advocate, or a trusted adult. If you feel hopeless or at risk of harming yourself, call or text 988 in the United States for immediate crisis support.

Also remember: people who care about you will care more about your safety than about judging you. Anyone who uses this situation to shame you is volunteering for the “not my support person” category. Let them go stand over there.

What Not to Do

  • Do not blame yourself for trusting someone.
  • Do not threaten the poster in a way that could hurt your case.
  • Do not pay sextortion demands.
  • Do not send more images to “prove” anything.
  • Do not mass-share the content while asking people to report it.
  • Do not assume one platform report is enoughfollow up and document each action.

Specific Examples: What Action Looks Like

Example 1: An Ex Posts Your Photos on Instagram

Take screenshots showing the post, username, date, caption, comments, and URL. Report the post as nonconsensual intimate imagery. Report the account if it has posted multiple images or threatened more. Use StopNCII if you are an adult. Consider a police report if threats, stalking, or repeated harassment are involved. If the person is an ex-partner, speak with a domestic violence advocate about safety planning.

Example 2: A Stranger Threatens to Leak Your Nudes Unless You Pay

Do not pay. Save the threats, username, payment request, and any contact details. Stop responding after evidence is saved. Report the account to the platform. File a complaint with IC3 if you are in the United States. If you are a minor, tell a trusted adult and report to NCMEC immediately.

Example 3: Someone Creates AI Deepfake Nudes of You

Document where the content appears and how it identifies you. Report it to the platform as nonconsensual sexual content or synthetic intimate imagery. Ask search engines to remove results. If the person used threats, impersonation, stalking, or blackmail, preserve all messages and consider law enforcement or legal help.

Experience-Based Advice: What Survivors Often Wish They Had Known Earlier

People who go through intimate image abuse often describe the first few hours as a blur. They open a message, see a screenshot, or get a warning from a friend, and suddenly the room feels too small. The first lesson is simple but powerful: do not let the abuser set the pace. Abusers thrive on urgency. They want you panicked, isolated, and making fast decisions. Slow the moment down. Drink water. Sit somewhere safe. Ask one trusted person to help you make a plan.

The second lesson is that evidence matters more than arguments. Many survivors waste precious energy trying to convince the poster to “be decent.” Sometimes that works, but often it gives the person more attention and control. A better approach is calm documentation: screenshot, save, report, repeat. Think like a librarian with boundaries. Label the evidence. Keep a folder. Write down dates. Future you may be very grateful that present you stayed organized while your nervous system was doing cartwheels.

The third lesson is that shame is a liar with a megaphone. It may tell you that everyone will remember this forever. Most people will not. The internet moves quickly, and platforms remove more abusive sexual content than they used to. The shame belongs to the person who violated your consent, not to you. You did not “cause” someone else to exploit your trust. Consent can be withdrawn. Privacy still matters. Having a body is not a scandal.

The fourth lesson is to choose your support circle carefully. You do not need to tell everyone. Start with people who are practical, calm, and kind. The right person says, “I’m here. What do you need?” The wrong person says, “Why did you take that photo?” Fire the wrong person from the emergency committee immediately. You can revisit complicated conversations later, after the crisis is stable.

The fifth lesson is persistence. One report may not remove everything. A platform may respond slowly. A search result may remain after the original page is gone. A repost may appear. This does not mean you failed. It means the process requires layers: platform reports, search engine removal requests, StopNCII or Take It Down, legal options, safety planning, and emotional support. Each step reduces the abuser’s power.

Finally, recovery is not only about deleting a photo. It is about getting your sense of safety back. That may mean changing passwords, talking to a counselor, taking a social media break, setting stricter boundaries, or learning how to spot manipulation earlier. None of those steps mean the abuse was your fault. They mean you are rebuilding control. And yes, control can come backone report, one password change, one supportive conversation, and one deep breath at a time.

Conclusion

If someone posts your nudes, the most important things to remember are: you are not to blame, you have options, and you do not have to handle it alone. Start with safety. Preserve evidence. Report the content to the platform. Use StopNCII if you are an adult, Take It Down if the image was created before age 18, and search engine removal tools if the content appears in results. Consider law enforcement, IC3, the FTC, NCMEC, legal help, and survivor-support hotlines depending on the situation.

Nonconsensual intimate image abuse is designed to make you feel powerless. A step-by-step plan does the opposite. It gives you a path. And when the internet behaves like a chaotic raccoon in a server room, a clear path is exactly what you need.