How to spot catfishing and protect your privacy online

A sex worker recounts finding out a long online friend was fake and shares steps for verification and recovery

I ended a two-year online friendship at the start of 2026 after discovering the person I trusted online was not who they claimed to be. I first connected in 2026 with someone who presented as a fellow independent sex worker; our bond grew from shared frustrations about clients, the economy, and the hazards of our work. Over time the connection included light sexting and the exchange of intimate images, and it felt like the rare comfort of a peer who understood industry-specific pressures.

Despite being generally cautious about digital threats—everything from targeted ads to misinformation and stalkers—I let my guard down because this account fit the pattern of an authentic creator. The relationship felt reciprocal and low-pressure: they never asked for money and declined offers of help. That dynamic led me to assume the usual defenses weren’t required, but I still had small, nagging questions about the account’s visuals and logistics. Those doubts prompted me to investigate further.

The moment I realized something was wrong

Suspicion grew when the imagery on the account seemed at odds with the person’s financial story and working methods. The photos were shot in rented rooms and hotels, which for many creators signals a higher production budget than someone claiming to be strapped for cash. I decided to run a practical check and pulled several images—both public shots and material shared privately—into a set of tools to see if they appeared elsewhere online. That decision led to the discovery that many images had been reposted from leak sites and belonged to other creators, revealing the profile as a composite assembled from stolen material.

Verification methods that helped

Reverse image search and what it can show

One of the most effective tools I used was reverse image search. By dropping photos into services like TinEye or Google Images, I found matches linking the pictures to multiple leak archives. These sites are often fed by subscribers who mass-download content and reupload it, creating a supply of stolen media used by impostors. If you suspect someone, try an reverse image search as a low-effort background check: it can reveal whether images are original, recycled, or hosted in contexts that contradict the person’s claims.

Audio/video checks and platform verification

Another straightforward step is to ask for a live interaction. A spontaneous voice or video call raises the bar for someone fabricating an identity because it introduces the need for real-time responses. While AI voice cloning and deepfakes exist, they are still less accessible for many scammers, and simple prompts—like asking the person to hold up a specific object or perform an unscripted gesture—can expose fakery. Additionally, checking for platform verification markers or corroborating claims across other social profiles can make it harder for a fraudster to sustain a fabricated backstory.

Why some people catfish and how to respond

Not all catfishing is financially motivated. As PR specialist Dylan Thomas Cotter points out, motives can include loneliness, the need for validation, or insecurity; sometimes someone impersonates another because they believe the real person would not be interested. Attorney Jeffrey Nadrich has warned that AI-generated images mean a person no longer needs an actual photographed individual to build trust online. These dynamics make the advice trust, but verify especially relevant: keep compassion for your own feelings while using practical checks to confirm identity.

When I confronted the person about the mismatched images, they initially denied wrongdoing and later admitted they were a man who had been posing as someone else. The admission ended the friendship. I felt betrayed, manipulated, and exposed—my intimate media had been shared under false pretenses—but I also learned durable lessons about verification and emotional recovery. You’re not to blame for being deceived; the responsibility lies with the deceiver.

Practical takeaways and moving forward

From this experience I developed a checklist I now recommend: use reverse image search early, request spontaneous audio or video verification as necessary, cross-check profile claims against other accounts, and remember that platform verification can offer some reassurance. For people who create sexually explicit content, the existence of leak ecosystems means protecting your media and applying caution when sharing new material. Emotional healing matters too: setting firm boundaries, blocking deceptive accounts, and leaning on real-world supports are essential after a breach of trust.

Catfishing is an old behavior in new clothes, enabled by technology but still rooted in human motives. While tools will keep evolving, basic digital literacy and a few consistent verification practices can reduce risk and help preserve privacy and trust online.

Scritto da Francesca Neri

ECJ decision requires member states to offer legal recognition for transgender people under freedom of movement

How ICE raids are disrupting HIV treatment and prevention in Latino communities