Find out who leaked it.
Give a different invisibly-watermarked copy to each person. Every copy looks identical to the original — no QR, no visible mark. When one leaks, drop it below and we'll tell you which recipient's copy escaped, with the full timestamped receipt.
Mint one watermarked copy per recipient.
When one leaks — drop it here.
The watermark cannot be seen. Each copy looks pixel-identical to the original you uploaded.
The fingerprint survives the recompression most platforms apply when you share an image — WhatsApp, Instagram, Twitter, Telegram, Signal.
Watermarking and detection both run in your browser. The image bytes never reach our servers — only a 32-byte hash does.
No watermark survives every attack — heavy editing, extreme compression, or deliberate watermark-removal tools can defeat it. For the realistic re-share paths a snitch actually uses, this works. Read the methodology if you want the technical details.