{"id":11342,"date":"2025-06-12T15:37:56","date_gmt":"2025-06-12T15:37:56","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=11342"},"modified":"2025-06-11T19:29:25","modified_gmt":"2025-06-11T19:29:25","slug":"the-threat-of-undressing-applications-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/","title":{"rendered":"The Threat of Undressing Applications: What You Need to Know"},"content":{"rendered":"<p>Filters, face effects, and design overlays are all part of the typical harmless fun of social media. We spent years digitally aging ourselves or changing our appearance based on trends. Now, that same technology is being used for a sinister new purpose \u2013 undressing applications.\u202fThe tool is used to digitally remove clothing in images, leading to the appearance of nudity or intimate apparel. Sixteen undressing websites received <a href=\"https:\/\/www.cbsnews.com\/news\/deepfake-pornography-victim-congress\/\" target=\"_blank\">200 million visitors<\/a> in the first half of 2024 alone. Undressing applications are a new digital threat that nonprofits, private firms, and government officials are collaborating to address.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Undressing_Applications_are_Deepfake_Generators\"><\/span>Undressing Applications are Deepfake Generators<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Advances in artificial intelligence and deepfake generators have led to the technology being used in the worst way possible. Deepfake generators can fabricate nudity or sexually explicit content. It\u2019s a concerning new tool in relation to the growing crime of non-consensual intimate image (NCII) abuse.<\/p>\n<p>In 2024, a <a href=\"https:\/\/www.independent.co.uk\/news\/world\/americas\/elliston-berry-deepfakes-social-media-b2566806.html\" target=\"_blank\">fifteen-year-old girl<\/a> fell victim to NCII abuse the morning after Homecoming. A classmate ran one of Elliston\u2019s Instagram pictures through an undressing application and then sent it around the school for nine months. Eventually, the teenage girl saw the image and told her mother about the incident.\u202fElliston shared her story to spread awareness, and her courage helped pave the way for the passage of the TAKE IT DOWN Act.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Newest_Tool_for_Sextortionists\"><\/span>The Newest Tool for Sextortionists<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The implications of undressing applications are dangerous to everyone online, especially women. Most undressing AI platforms are only trained to work on images of females, which puts young women at an increased risk of abuse.<\/p>\n<p>Offenders will often target people they know via social media or dating platforms. They discover online images of their target and run them through undressing applications. Once they render a convincing image, they can go down several routes.<\/p>\n<p>Perpetrators may use the images for online blackmail in which they threaten to expose the images publicly if the victim doesn\u2019t pay them a certain amount of money. This is known as sextortion. They may also demand sexual favors or content, a form of online blackmail known as sexploitation.<\/p>\n<p>In many cases, the culprit will spread the images publicly without the victim\u2019s consent. In legal terms, this is known as non-consensual intimate image abuse or revenge porn. Whether it is sextortion, sexploitation, or revenge porn, image-based sexual abuse can cause severe reputational damage and emotional distress.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Illusion_of_Reality_and_its_Impact\"><\/span>The Illusion of Reality and its Impact<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Sexual deepfakes being used for online blackmail tend to be given less weight. However, the sophisticated nature of these apps makes it difficult to distinguish between what\u2019s real and fake. In many instances, victims experienced similar repercussions and emotional distress as if the images were real.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Legal_and_Ethical_Minefield_of_Undressing_Applications\"><\/span>The Legal and Ethical Minefield of Undressing Applications<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Legal frameworks have lagged behind the development of the internet, and now, artificial intelligence. States have only recently begun tackling NCII abuse, but many of them still have no laws against sexual deepfakes.<\/p>\n<p>Only <a href=\"https:\/\/www.multistate.ai\/deepfakes-synthetic-media\" target=\"_blank\" rel=\"nofollow noopener\">36 states<\/a> have enacted laws against sexual deepfakes. However, there are differences in the language that can completely change the path of justice against perpetrators. <a href=\"https:\/\/codes.findlaw.com\/tx\/penal-code\/penal-sect-21-165\/\" target=\"_blank\">Texas<\/a>, for example, criminalizes creating and distributing sexual deepfakes of others without consent while other states only criminalize the distribution.<\/p>\n<p>NCII abuse may be prosecuted under other statutes related to harassment, extortion, or child sexual abuse material (CSAM) if minors are involved. The fragmented patchwork of state laws creates an uncertain legal pathway for victims, and a federal law can help bridge those legal gaps.<\/p>\n<p>Fortunately, the <a href=\"https:\/\/www.congress.gov\/bill\/118th-congress\/senate-bill\/4569\/text\" target=\"_blank\">TAKE IT DOWN Act<\/a> passed the House of Representatives and was signed into law this past May. The bill federally criminalizes the distribution of NCII, including sexual deepfakes. It also forces online platforms to remove NCII abuse within forty-eight hours of being reported.<\/p>\n<p>While laws are catching up to the online landscape, any legal action requires an identifiable perpetrator, and many cases of NCII abuse are committed anonymously. It can be difficult to track down perpetrators that distributed content digitally, and victims need the help of law enforcement or private security firms to identify the criminal responsible.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Role_of_Platform_Regulation\"><\/span>The Role of Platform Regulation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Outside of legal avenues, online platforms can regulate the availability of undressing applications and any revenge porn being distributed. <a href=\"https:\/\/techcrunch.com\/2024\/06\/06\/google-play-cracks-down-on-ai-apps-after-circulation-of-apps-for-making-deepfake-nudes\/\" target=\"_blank\" rel=\"nofollow noopener\">Google and Apple<\/a> have both cracked down on apps using generative AI for inappropriate purposes in their app stores. However, many undress applications can also be accessed on their websites.<\/p>\n<p>Social media networks are another platform with an important role. The platforms can prevent the distribution of revenge porn and create more effective reporting systems for identification. Platforms like Facebook, Instagram, and Snapchat have taken steps to combat non-consensual intimate image sharing, but significant progress is still needed.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Critical_Role_of_Digital_Forensics_in_Cases_Involving_Undressing_Apps\"><\/span>The Critical Role of Digital Forensics in Cases Involving Undressing Apps<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Forensic analysts are a valuable resource for victims of NCII abuse and sexual deepfakes. These experts can use AI image forensics to identify inconsistencies in lighting, skin tone, texture, or anatomical features that confirm an image\u2019s synthetic origin. Digital investigators can also analyze IP addresses and use metadata analysis to trace the origin of the non-consensual distribution, pinpointing the identity of the perpetrator.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Steps_To_Protect_Your_Innocent_Images_from_These_Apps\"><\/span>Steps To Protect Your Innocent Images from These Apps<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Protecting yourself from non-consensual distribution of sexual deepfakes is difficult. Cybercriminals can take an innocent image and turn it into something malicious. However, there are ways you can lower the likelihood of becoming a victim. Here are a few tips on how to protect yourself from undressing apps.<\/p>\n<ul>\n<li><strong>Lock down social media accounts.<\/strong> Make sure your profile and posts are set to private. While making your social accounts private doesn\u2019t protect you from people you already know, it can prevent strangers from accessing your content.<\/li>\n<li><strong>Be cautious of what you post.<\/strong> AI deepfakes work best with high-quality images, simple poses, and form-fitting clothing. You can make the deepfake process challenging for cybercriminals by posting images that contradict this criterion.<\/li>\n<li><strong>Audit your friends list.<\/strong> Even someone familiar to you can commit NCII abuse. It\u2019s best to remove any friend or follower that you don\u2019t know well to minimize any risk.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Get_Help_Today\"><\/span>Get Help Today.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>At Digital Forensic Corp., we specialize in protecting victims of sextortion. Not only do we take over the communications with the perpetrator, but our team of experts can also follow their digital trail to unmask their identity. Contact the <a href=\"\/blog\/sextortion-online\/report-sextortion-online\/\">Sextortion Helpline<\/a> today if you want a team of professionals fighting alongside you.<\/p>\n","protected":false},"excerpt":{"rendered":"Filters, face effects, and design overlays are all part of the typical harmless fun of social media. We&hellip;","protected":false},"author":132,"featured_media":11345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[767],"tags":[],"class_list":{"0":"post-11342","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion-online","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Threat of Undressing Applications - What You Need to Know<\/title>\n<meta name=\"description\" content=\"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Threat of Undressing Applications - What You Need to Know\" \/>\n<meta property=\"og:description\" content=\"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-12T15:37:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benjamin Carpenter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Threat of Undressing Applications - What You Need to Know\" \/>\n<meta name=\"twitter:description\" content=\"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benjamin Carpenter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/\"},\"author\":{\"name\":\"Benjamin Carpenter\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\"},\"headline\":\"The Threat of Undressing Applications: What You Need to Know\",\"datePublished\":\"2025-06-12T15:37:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/\"},\"wordCount\":1080,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Undressing-Applications.jpg\",\"articleSection\":[\"Resources for Victims of Internet Sextortion\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/\",\"name\":\"The Threat of Undressing Applications - What You Need to Know\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Undressing-Applications.jpg\",\"datePublished\":\"2025-06-12T15:37:56+00:00\",\"description\":\"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Undressing-Applications.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Undressing-Applications.jpg\",\"width\":1280,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/the-threat-of-undressing-applications-what-you-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources for Victims of Internet Sextortion\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/sextortion-online\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Threat of Undressing Applications: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/773c64cac299aa62d21e9e41427e37b6\",\"name\":\"Benjamin Carpenter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/benjamin-carpenter_avatar-96x96.png\",\"caption\":\"Benjamin Carpenter\"},\"description\":\"Cybercrime Content Strategist and Victim Advocacy Writer \\\"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\\\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/benjamin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Threat of Undressing Applications - What You Need to Know","description":"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"The Threat of Undressing Applications - What You Need to Know","og_description":"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.","og_url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-06-12T15:37:56+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications-1.jpg","type":"image\/jpeg"}],"author":"Benjamin Carpenter","twitter_card":"summary_large_image","twitter_title":"The Threat of Undressing Applications - What You Need to Know","twitter_description":"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Benjamin Carpenter","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/"},"author":{"name":"Benjamin Carpenter","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6"},"headline":"The Threat of Undressing Applications: What You Need to Know","datePublished":"2025-06-12T15:37:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/"},"wordCount":1080,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications.jpg","articleSection":["Resources for Victims of Internet Sextortion"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/","url":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/","name":"The Threat of Undressing Applications - What You Need to Know","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications.jpg","datePublished":"2025-06-12T15:37:56+00:00","description":"Undressing applications can turn innocent photos into deepfake nudes. Learn how you can protect yourself with tips from the experts.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/06\/Undressing-Applications.jpg","width":1280,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/the-threat-of-undressing-applications-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources for Victims of Internet Sextortion","item":"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/"},{"@type":"ListItem","position":3,"name":"The Threat of Undressing Applications: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/773c64cac299aa62d21e9e41427e37b6","name":"Benjamin Carpenter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/benjamin-carpenter_avatar-96x96.png","caption":"Benjamin Carpenter"},"description":"Cybercrime Content Strategist and Victim Advocacy Writer \"Online abuse can happen to anyone \u2014 my job is to make sure they know what to do next.\" \u2014 Benjamin Carpenter &#xa0; Benjamin Carpenter is a digital safety content specialist dedicated to empowering individuals and organizations with the knowledge and tools to defend themselves against cybercriminals. With a background in communication and a deep understanding of online threats, Benjamin focuses on creating content that bridges the gap between a general unawareness of cyber threats and application of the best online safety practices. &#xa0; Expertise Benjamin\u2019s work centers around some of the most pressing and emotionally charged areas in cybersecurity today: \u2022 Data breach response and regulatory compliance \u2022 Legal protections against non-consensual image sharing (NCII) \u2022 Blackmail and sextortion response strategies \u2022 Victim-centered resources and education \u2022 Analysis of trending cybercrime tactics &#xa0; Role at Digital Forensics Corp. At Digital Forensics Corp., Benjamin plays a critical role in creating valuable educational content for victims, families, and corporate teams. He collaborates with cybercrime experts and legal professionals to ensure accuracy, and his work helps readers navigate crises with confidence. Benjamin\u2019s content has become a go-to resource for individuals facing cybercrime, and he has developed subject-matter depth in: \u2022 Sextortion and blackmail targeting minors and adults \u2022 U.S. and international legislation related to image-based sexual abuse \u2022 Incident response frameworks for individuals, families, and organizations under attack &#xa0; Notable Publications &amp; Projects \u2022 \u201cSextortion Targeting Minors: A Booklet for Parents\u201d \u2013 A parent-friendly resource on how to identify warning signs, talk to children at risk, and prevent manipulation by online predators. \u2022 LinkedIn Educational Campaign for IT Security Professionals \u2013 A content series exploring digital privacy law, NCII laws, and organizational incident response plans. \u2022 \u201cSextortion: A Comprehensive Guide\u201d \u2013 A long-form resource going through sextortion tactics, victim support organizations, and the value of cybercrime experts. &#xa0; Professional Values Benjamin believes digital safety content should be practical, empathetic, and transparent. His approach combines: \u2022 Insights from cybersecurity experts \u2022 Real accounts from cybercrime victims \u2022 Empirical data from industry research &#xa0; Education \u2022 B.S. in Communication and Media Studies Ohio University &#xa0;","url":"https:\/\/www.digitalforensics.com\/blog\/author\/benjamin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/11342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/132"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=11342"}],"version-history":[{"count":3,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/11342\/revisions"}],"predecessor-version":[{"id":11506,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/11342\/revisions\/11506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/11345"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=11342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=11342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=11342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}