Afraid that your nudes will leak? Safely sexting is really not that difficult

Sharing spicy photos and videos – also called sexting – is fun, exciting and good for your sex life, but there are also risks involved. You can limit these risks as much as possible, for example by safely storing the images or using specific apps.

‘Then you should not have sent that kind of photos.’ It is a well-known phenomenon to convict victims of revenge porn: take Patricia Paay , Chantal from Werkendam or vlogger Laura Ponticorvo, for example .

The three women had made sexual photos and videos in private spheres and shared them with their partners. With Paay and Chantal cases the material was distributed by someone in their private environment, with Ponticorvo case a hacker had stolen the photos and videos.

In both cases you can limit the risks of making this type of photos and videos. Because sharing spicy snapshots can certainly contribute to a more exciting sex life and a healthier relationship, says sexoligist Astrid Kremers to RTL News.

Incentives

First of all: making nude photos is not new. “We have been taking nude pictures for a lot longer: just with a camera, yourself or each other, but the smartphone has made it easier to make and send nude photos,” says Kremers.

These sexually tinted photos and videos provide stimuli – we get excited about that. Kremers: “But you can also get excited about yourself, and sharing nude photos is risky, which also contributes to the tension.”

Hackers

Indeed, sending nude photos is risky. If you want to share spicy photos and videos, you have to consider two types of risks: your partner who distributes them, or a hacker who steals them.

Let’s start with the hacker. In most cases, this criminal tries to break into the cloud service where you store all your photos, such as Google Photos, iCloud or Dropbox. In that case, it is sufficient to set two-step verification : even if the hacker has your password, he still has to enter the code that only you see on your phone.

With Cryptomator you encrypt your files in the cloud

Another option is to lock the photos, for example by encrypting them (a free app for that is Cryptomator) and then uploading them to the cloud. Even though the hacker would gain access, he is with encrypted files that can not be opened.

A final option is to simply store the photos locally, for example on your smartphone. There are plenty of apps to store photos securely, behind a pin code or fingerprint: take Samsung’s Knox app or the Private Photo Vault app. You can also set in Android and iOS that some apps can only be opened with a pin code.

Your partner

Then the second scenario: the partner who forwards something. This is a lot harder, because the trust is violated with which you initially shared these private snaps.

First of all, you can ensure that you are unrecognizable, for example by not putting your head on the photo or video. In early 2016, the broadcaster BNN called attention to the action #NoHead! , a call to keep on sexting – but without putting your head on it.

Another way is to use an app that automatically removes the photos and videos. Among others, Snapchat and Instagram offer this possibility. However, the recipient can make a screenshot (you will get a report of that), or just a photo of the smartphone screen. Unfortunately you do not do anything about it.

If you are having sex with several people, you can place a watermark with the name of the recipient over the photo. This discourages the recipient from forwarding the photo. An app that you can use for this is eZy Watermark .

More exciting sex life

According to Kremers, young people in particular have to to be careful about sending nude photos, because they are less able to assess the risks. People with a short relationship can also first build up a relationship of trust with each other.

“In my practice, couples often come up with a long relationship that wants to give their sex life a boost,” says Kremers. “Making and sharing nude photos is one of the things that can provide new stimuli, and nude photos can contribute to a more exciting sex life if you both enjoy it and treat it with respect.”

Source: RTL Nieuws.

The sex workers guide to the internet now that SESTA/FOSTA came into play

So here we are, the supposed land of the free first got rid of net neutrality and then it came for the content of advertisements. Backpage got seized because they allowed sex workers to advertise their business. *gasp*

Luckily this is the internet and the internet interprets censorship as damage and it routes around it. And I am here to teach you how to do that.

First things first you will need the Tor browser. If you’re really hardcore you might even want to use Tails. Secondly you’re going to need Pidgin+OTR because before SESTA/FOSTA became a thing Skype decided that they get to police what kind of video chats you’re allowed to have.

You might also want to have a VPN. While video chats should be possible over Tor, that is not always the case. A VPN is faster but there is a trade off. All VPN’s tell you they do not keep any logs, but there is only VPN-provider which has actually proved that they don’t. That’s Private Internet Access.

Lastly, and I know this controversial, you might need intimate.io, blockchain technology specifically designed for the adult industry.  It runs on Ethereum so that makes it possible to (invisibly) watermark your porn with the name of the recipient and to automatically fine the buyer if they upload it anywhere else. They agreed with a smart contract after all. I’ll be more opinionated about it after April 26, the day that it launches.

Now that we are passed the stage of throwing brand names, let’s explain how stuff works.

First Tor. The Tor-browser is a hardened version of Firefox that can also access .onion-domains. I know Backpage got seized, that is why I am writing this, I do not know why Backpage is not on the darknet yet. (You can get a daily overview of each and every website on the darknet here.)

You can get free hosting on the darknet here, of course that link only works if you use the Tor-browser.

Tails is a bit more complex, it’s an OS that you install on an USB-stick, which sends all your traffic through the Tor-network. If you want to be ultra-paranoid Tails is the OS for you.

Next up, Pidgin. Or XMPP as the protocol is known. Edward Snowden revealed that even the NSA could not hack it. Pidgin is the same double edged sword as Tor. Both hacktivists and secret agents use it.  That may sound like a bad deal, but it’s not.

Skype may have chosen to police content. Pidgin/Jabber won’t because it can’t. End to end encryption means nobody knows what the clients are saying to each other. And it allows you to videochat.

If you use a mobile phone, use Signal. Do not use Whatsapp. Whatsapp = Facebook.

To promote your hidden site you can  use switter.at, an instance of mastodon.social especially for sex workers.

If I did any sex work, I’d be extremely paranoid right now. If you do any sex work and I happen to like you, I’m more than happy help you to migrate you to a system where not a single government can touch you. If I don’t know you, I will gladly help you in exchange for a donation to charity.