CAPABILITY ยท Client under NDA

Online Image Protection & Misuse Detection Platform

SaaS that helps users protect personal photos online. Images are stored encrypted, served through tracked URLs (never raw bucket links), and continuously checked for unauthorised reuse across the web.

CybersecurityPrivacy TechnologyDigital Rights ManagementImage SecurityPhoto ProtectionAnti-Piracy TechCreator Tools
See it work

Upload, share, catch every misuse.

Photos upload to an encrypted library, share through tracked URLs with watermark and expiry, log every view by who/where/when, and surface unauthorised reuse on the open web with a side-by-side match and a one-click DMCA takedown.

protect.app
Upload to protected library
๐Ÿ›ก protect
Upload
Library
Shared
Alerts
Takedowns
Audit log

Upload to your protected library

42 images ยท 2 alerts
Drop image to protect
JPG ยท PNG ยท TIFF ยท max 50 MB
portrait_studio_final.jpg
3.2 MB ยท 4500ร—3000
Demo only

This is an animated mockup of the image-protection capability โ€” not a live product. Viewer emails, IPs, and the "found on" site name are illustrative; the protected image is from Unsplash.

01

Encrypted at rest

Images are stored in encrypted object storage. Access controls live in the platform โ€” not in the bucket โ€” so revoking a share takes effect immediately.

02

Tracked sharing URLs

Every share generates an internal tracked URL โ€” not a raw bucket link. Every view records viewer, IP, location, and timestamp.

03

Watermark + view rules

Per-share watermark, expiry date, max-view count, and right-click disable. Applied at view-time so the original asset stays clean.

04

Per-image access log

The dashboard shows every access for every image โ€” who viewed it, from where, when, and through which shared link.

05

Web-wide misuse detection

Background workers continuously check the protected library against third-party image-match services and surface unauthorised reuse with a side-by-side comparison.

06

DMCA action workflow

From the misuse detail, send a DMCA takedown, save evidence, or mark the use as authorised. Every action is logged in the audit trail.

What we built

SaaS that helps users protect personal photos online. Images are stored encrypted, served through tracked URLs (never raw bucket links), and continuously checked for unauthorised reuse across the web.

How we built it

User uploads through a secure portal; images are encrypted at rest in object storage. Every view is served through an internal tracked URL layer โ€” so the platform knows who viewed it, when, and from where, and can revoke access at any time. Third-party image-match APIs surface suspected reuses for the owner to review.

End users upload sensitive personal images โ€” model portfolios, family photos, art reference, signed works โ€” and configure who can view them. The serving layer issues tracked URLs instead of exposing raw bucket paths, so every access is logged and revocable. Background workers periodically check the user's protected library against third-party image-match services; any external usages found are reported to the owner with a screenshot and link to the offending page.

Architecture

How a request flows through it

Each request enters at the top of the diagram, flows through every box, and lands at the bottom โ€” exactly the way the production system behaves. The scan-line traces where a live request would be right now.

tracing request flow
User uploads image
โ”‚
โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ Vue.js + Laravel app โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚ Tracked URL layer โ”‚
โ”‚ (internal, not raw S3) โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
โ–ผ
AWS S3 storage
โ”‚
โ–ผ
Third-party misuse detection API
โ–ผ flow directionโ”Œโ”€โ” component
Stack

What it's built with

Capabilities
User Image PortalEncrypted Object StorageTracked URL Serving LayerPer-image Access ControlsView Audit LogThird-party Image-Match IntegrationReuse Detection ReportsSocial Media Account LinkingAccess Revocation
Engineering notes

The interesting parts

Tracked URLs, not raw bucket links

Every image is served through an internal URL layer so the platform knows who viewed it, when, and from where โ€” and can revoke access at any time without rotating bucket credentials.

Encrypted at rest

Images are encrypted at rest in object storage with access controls aligned to the platform's permission model โ€” not just bucket-level controls.

Continuous misuse detection

Background workers check the protected library against third-party image-match APIs. Owners get a report with screenshots and links for every suspected external reuse.

Social account linking

Owners can link their social accounts so the detection layer also scans their own public profile content as the baseline, reducing false positives.

Decisions

The calls that did most of the work

A handful of engineering choices shape how a system feels. Here are the ones we'd still defend โ€” alongside what each one cost.

01

Internal tracked URLs over raw S3 presigned URLs

Knowing who viewed each image (and when) is the whole product. Raw S3 access bypasses that signal.

Tradeoff: Every image read goes through the application, so edge caching is harder and adds an extra hop.

02

Enhance the existing platform, not replace it

A working platform with paying users earns the right to incremental changes; structured enhancements ship faster and ship safer.

Tradeoff: Inherited architectural decisions in the legacy code constrain how clean the new layers can be.

Want something like this?

Tell us what you're building.

Free 30-minute call. Real humans, real timelines, no follow-up emails forever.

See more capabilities