Our mission is to eliminate blackmail risk from rogue actors. We propose a secure, trusted platform that removes vulnerable content from your device.
- Scan your files for threats
- Categorise them into risk levels
- Offer bulk-delete or encryption
Model users: Civil servants, politicians, celebrities, military personnel
- Click the Railway deploy button above
- Set your
GROQ_API_KEYenvironment variable - Deploy and start scanning your files!
- Joey Bream 🐟 - AI safety operations
- Prev MEng @ Cambridge, Krueger Lab
- Dario Cline 🦅 - Mech-interp
- Prev CS @ Bath
- Anthony Joshua 🐯 - Cyber-security
- Prev CS @ Canterbury
Example vulnerabilities:
- Personal identifiers: ID cards, passports, driver's licenses, birth certificates
- Intimate content: Nude images, sexual messages, dating app conversations
- Financial information: Credit card details, bank statements, tax documents
- Medical records: Health diagnoses, prescription information, medical history
- Credentials: Passwords, API keys, login tokens
- Location data: Home addresses, travel itineraries, frequent locations
- Illegal content: Illegal pornography, drug-related conversations, pirated content, extremist materials
-
Politician’s Leaked Photos A minister’s personal Gmail and Google Photos contain private vacation pictures and messages with friends. A rogue actor gains access and threatens to release them during election season. With our tool: A scan conducted 6 months before election season flagged these as medium risk intimate content. The minister bulk-encrypts them, eliminating the attack surface before the threat emerges.
-
Civil Servant With Classified Docs at Home A senior civil servant is accidentally storing scanned IDs and sensitive government drafts in Google Drive. If hacked, these could compromise national security. With our tool: Drive scan identifies “government ID” documents and financial spreadsheets, highlights them as high risk, and guides the user to encrypt/delete, also ensuring compliance with government data handling policies.
-
Celebrity Revenge Threat A celebrity’s iCloud/Google Photos contains personal nude images. A former partner attempts extortion. With our tool: Prior scanning had flagged and moved it to an encrypted vault, so even if the account was accessed, no sensitive material was left to exploit.
-
Tech Founder Credential Leak A startup founder has API keys and server credentials stored in plain-text in their Drive and email. Hackers threaten to cripple the business. With our tool: Credential scanner flags keys and passwords, categorises them as high risk, and provides auto-recommendations for secure storage, potentially saving millions in damages and customer trust.
-
Military Officer Location Data A deployed officer keeps flight tickets, hotel bookings, and GPS-tagged images in Gmail and Photos. These reveal patterns of movement that could compromise ongoing operations or personnel safety. With our tool: Location metadata and itineraries are detected, categorised as medium/high risk, and can be bulk-encrypted or scrubbed of metadata.
Our Approach: Comprehensive Digital Vulnerability Assessment
We're building a privacy-first scanning tool that connects to your Google services (Gmail, Photos, and Drive) to identify content that could make you vulnerable to blackmail or security threats.
How it works:
- Secure Authentication - Users log in through Google's OAuth system, ensuring we only access what is necessary while maintaining full data privacy.
- Multi-Platform Scanning:
- Gmail: Analyse email content for compromising conversations, threats, or sensitive exchanges using NLP.
- Google Photos: Detect intimate or explicit images using multi-modal models.
- Google Drive: Scan documents, spreadsheets, and files for personal identifiers, financial data, credentials, and other sensitive information.
- Risk Assessment - Each flagged item is categorised by threat level:
- High Risk: Could cause immediate reputational or security damage
- Medium Risk: Potentially compromising in wrong hands
- Low Risk: Minor vulnerabilities worth addressing
- User-Controlled Response - Present findings through a clean interface where users can:
- Review flagged content with clear explanations.
- Choose to delete or encrypt items in bulk.
- Receive guidance on best practices for digital security.
Key Principles:
- No data storage - everything processed locally and securely
- Full user control over actions taken
- Transparent about what's being scanned and why
- Designed specifically for high-profile individuals who face elevated risks
The tool essentially acts as a comprehensive "digital audit" to help users proactively secure their online presence before it can be exploited.
Example output from running system vulnerability scan
- Gmail: 3
- Photos: 15
- Drive: 8
- Gmail: 9
- Photos: 32
- Drive: 0
- Gmail: 12
- Photos: 3
- Drive: 1
cd Blackmail-Scanner-Flask-Web
pip install -r requirements.txt
export GROQ_API_KEY="your_api_key_here"
python blackmail_file_scanner_frontend.py- Fork this repository
- Click the Railway button above
- Connect your GitHub account
- Set environment variables:
GROQ_API_KEY: Get from console.groq.comFLASK_ENV: Set toproduction
- Deploy! 🎉
- Install Railway CLI
railway logincd Blackmail-Scanner-Flask-Webrailway initrailway up
| Variable | Description | Required |
|---|---|---|
GROQ_API_KEY |
API key for AI vision model | Yes (for scanning) |
FLASK_ENV |
Set to production |
Recommended |
- Backend: Flask, SQLite, Python
- Frontend: Bootstrap 5, JavaScript
- AI: Groq Vision API (Llama 4 Scout)
- Deployment: Railway, Gunicorn
- Database: SQLite (file-based)
- File Detection: Automatic discovery of image files
- AI Classification: SFW/NSFW detection using vision models
- Risk Assessment: Categorized threat levels
- Database Tracking: SQLite-based file management
- Error Handling: Robust failure recovery
- Dashboard: Real-time statistics and file overview
- Responsive Design: Mobile-friendly Bootstrap UI
- Status Tracking: Visual indicators for scan progress
- Health Monitoring: Built-in health check endpoints
- No Data Retention: Files processed locally, not stored
- API Security: Secure key management
- Privacy-First: Designed for sensitive data handling
- Defensive Purpose: Built for cybersecurity professionals