Humans on the Internet: About Privacy and Nudes

Medteck Thiam
5 min readAug 20, 2020
Credit: Getty Images

Should you send nudes to your crush ? I can help you answer yourself.

Before we go any further, I want this to be clear. This article is not judgemental. I’m not telling anyone to do anything because this is my point of view and I strongly believe everybody has 100% right on his own body.

Let’s start with some stats from EndRevengePorn.org:

  • 83% of revenge porn victims said they had taken nude photos/videos of themselves and shared it with someone else
  • 90% of revenge porn victims were women
  • 57% of victims said their material was posted by an ex-boyfriend

Why do people take nude photos ? And why do they send them to other people ?

People have different behaviours, beliefs, and see things with different approaches, so it’s impossible to determine one common reason. But the most related one is about couples sending photos to each other. These people usually say they do it to fill the void created by the distance separating them to their lover.

How do they send nudes ?

Usually, people will send those compromising photos using apps like Snapchat (for those who want to feel safer) or other apps like Whatsapp, iMessage, Messenger etc. (for those who just don’t care). With those apps, the receiver can save the photos by taking screenshots, or simply directly saving them on his device.

If those pictures are private, how do leaks occur ?

When someone’s nude leaks, the most common question he or she will get is… Why did you take those pictures at the first place. People around the victim will tend to say or think rude things like the victim is the only person responsible of what happens to him or her. But actually, the main responsible is the person who leaks those pictures.

Remember.. 57% of all revenge porn victims are women who sent pictures to their boyfriends and they are the ones who post the pictures on the Internet. When we put this information alongside all other stats from the same source, we can quickly see how those pictures were sent to a person that the victim used…

--

--