1. Executive Intelligence Summary
The digital ecosystem of adult social networking, exemplified by Adult Friend Finder (AFF), represents a critical convergence of consumer privacy risks, cybersecurity vulnerabilities, and sophisticated financial predation. As the flagship property of FriendFinder Networks Inc. (FFN), AFF has operated for over two decades, accumulating a massive repository of highly sensitive personally identifiable information (PII) and psychographic data. This report delivers an exhaustive, deep-dive analysis of the platform’s operational history, security posture, and the rampant criminal activity that parasitizes its user base.
Our investigation indicates that AFF functions as a high-risk environment where the boundaries between platform-sanctioned engagement strategies and third-party criminal exploitation are frequently blurred. The platform’s history is defined by catastrophic data negligence, most notably the 2016 mega-breach which exposed over 412 million accounts—including 15 million records explicitly marked as “deleted” by users.1 This incident stands as a definitive case study in the failure of data lifecycle management and the deceptive nature of digital “deletion.”
Furthermore, the platform serves as a primary vector for financially motivated sextortion, a crime that has escalated to the level of a “Tier One” terrorism threat according to recent law enforcement assessments.3 Criminal syndicates, primarily operating from West Africa and Southeast Asia, leverage the platform’s anonymity and the social stigma associated with its use to engineer “kill chains” that migrate victims to unmonitored channels for blackmail.4 The rise of Generative AI has exacerbated this threat, allowing for the creation of deepfake personae and the fabrication of compromising material where none previously existed.6
From a corporate governance perspective, FFN has insulated itself through robust legal maneuvering, utilizing mandatory arbitration clauses to dismantle class-action lawsuits and successfully navigating Chapter 11 bankruptcy to return to private control, thereby reducing financial transparency.8 The analysis that follows dissects these elements, providing a granular risk assessment for cybersecurity professionals, legal entities, and individual users.
2. Organizational Genealogy and Corporate Governance
To understand the current threat landscape of Adult Friend Finder, one must analyze the corporate entity that architects its environment. FriendFinder Networks is not merely a website operator but a complex conglomerate that has navigated significant financial turbulence and ownership changes, influencing its approach to user monetization and data retention.
2.1 Origins and Structural Evolution
Founded in 1996 by Andrew Conru, FriendFinder Networks established itself early as a dominant player in the online dating market. The company’s portfolio expanded to include niche verticals such as Cams.com, Passion.com, and Alt.com.9 While these sites appear distinct to the end-user, they share a centralized backend infrastructure. This architectural decision, while cost-effective, created a “single point of failure” where a vulnerability in one domain compromises the integrity of the entire network.1
The company’s trajectory includes a tumultuous period under Penthouse Media Group. In 2013, the company filed for Chapter 11 bankruptcy protection in the U.S. Bankruptcy Court for the District of Delaware, citing over $660 million in liabilities against $465 million in assets.9 This financial distress is critical context for the platform’s aggressive monetization tactics; the pressure to service high-interest debt likely incentivized the implementation of “dark patterns” and automated engagement systems to maximize short-term revenue at the expense of user experience and safety.9 Following reorganization, control reverted to the original founders, transitioning the company back to private ownership and shielding its internal metrics from public market scrutiny.9
2.2 Leadership and Litigious History
The governance of FFN is characterized by a litigious approach to stakeholder management. The legal dispute Chatham Capital Holdings, Inc. v. Conru (2024) illustrates the company’s aggressive tactics. In this case, Andrew Conru, acting through a trust, acquired a supermajority of the company’s debt notes and unilaterally amended the payment terms to disadvantage minority investors.10
This maneuver, upheld by the Second Circuit Court of Appeals, demonstrates a corporate culture willing to exploit contractual technicalities—specifically “no-action” clauses—to silence dissent and consolidate control.10 This behavior parallels the company’s treatment of its user base, where Terms of Service (ToS) and arbitration clauses are wielded to prevent recourse for data breaches and fraud.8 The willingness to engage in “strong-arm” tactics against sophisticated investment firms suggests a low probability of benevolent treatment toward individual consumers.
2.3 The “Freemium” Trap and Monetization
AFF operates on a “freemium” model that acts as a funnel for monetization. Free “Standard” members are permitted to create profiles and browse but are severely restricted from meaningful interaction. They cannot read messages or view full profiles without upgrading to “Gold” status.13
Forensic analysis of user reviews indicates a systemic reliance on simulated engagement to drive these upgrades. New users report an immediate influx of “winks,” “flirts,” and messages within minutes of account creation—activity levels that are statistically improbable for genuine organic interaction, particularly for generic male profiles.15 Once the user pays to unlock these messages, the engagement often ceases or is revealed to be from bot scripts, a phenomenon discussed in detail in Section 5.
3. The 2016 Mega-Breach: A Forensic Autopsy
The defining event in AFF’s security history is the October 2016 data breach. This incident was not merely a large data dump; it was a systemic failure of cryptographic standards and data governance that exposed the intimacies of 412 million accounts.1
3.1 The Vulnerability Vector: Local File Inclusion (LFI)
The breach was precipitated by a Local File Inclusion (LFI) vulnerability. LFI is a web application flaw that allows an attacker to trick the server into exposing internal files. In the case of AFF, researchers (and subsequently malicious actors) exploited this flaw to access source code and directory structures.1
The existence of an LFI vulnerability in a high-traffic production environment indicates a failure in input sanitization and a lack of secure coding practices (specifically, the failure to validate user-supplied input before passing it to filesystem APIs). Furthermore, reports indicate that a security researcher known as “Revolver” had disclosed the vulnerability to FFN prior to the massive leak, yet the remediation was either insufficient or too late.2 This points to a deficient Vulnerability Disclosure Program (VDP) and sluggish incident response capabilities.
3.2 Cryptographic Obsolescence: The SHA-1 Failure
The most egregious aspect of the breach was the method of credential storage. The database contained passwords hashed using the SHA-1 algorithm.18 By 2016, SHA-1 had been deprecated by NIST and the broader cryptographic community due to its vulnerability to collision attacks.
However, FFN’s implementation was even weaker than standard SHA-1. Forensic analysis by LeakedSource revealed that the company had “flattened” the case of passwords before hashing them.1
- Case Flattening: Converting all characters to lowercase.
- Entropy Reduction: This process drastically reduces the character set from 94 printable ASCII characters to 36 (a-z, 0-9).
- Mathematical Consequence: This exponential reduction in entropy meant that 99% of the passwords were crackable within days using commercially available hardware and rainbow tables.2
This decision suggests that the system architecture was designed with a fundamental misunderstanding of cryptographic principles. The passwords were essentially stored in a format only marginally more secure than plaintext.
3.3 The “Deleted” Data Deception
A critical finding from the 2016 breach was the exposure of 15 million accounts that users had previously “deleted”.1 In database administration, this is known as a “soft delete”—setting a flag (e.g., is_deleted = 1) rather than physically removing the row from the table (DROP or DELETE).
While soft deletes are common for data integrity in enterprise systems, their use in a platform handling highly stigmatized sexual data is a severe privacy violation. Users who believed they had severed ties with the platform found their data—including sexual preferences and affair-seeking status—exposed years later.2 This practice violates the “Right to Erasure” principles central to modern privacy frameworks like GDPR and CCPA, although these regulations were not fully enforceable at the time of the breach.
3.4 Cross-Contamination and Government Exposure
The breach revealed the interconnected nature of FFN’s properties. Data from Penthouse.com was included in the leak, despite FFN having sold Penthouse months prior.1 This indicates a failure to segregate data assets during corporate divestiture.
Additionally, the breach exposed sensitive user demographics:
- 78,000 U.S. Military addresses (.mil) 1
- 5,600 Government addresses (.gov) 1
The exposure of government and military personnel on a site dedicated to extramarital affairs creates a national security risk, as these individuals become prime targets for coercion, blackmail, and espionage recruitment by foreign adversaries utilizing the breached data.2
4. The Automated Deception Ecosystem (Bots)
The Adult Friend Finder ecosystem is heavily populated by non-human actors. These “bots” serve multiple masters: the platform itself (for retention), affiliate marketers (for traffic diversion), and criminal scammers (for fraud).
4.1 Platform-Native vs. Third-Party Bots
Forensic analysis of user interactions suggests a bifurcated bot problem:
- Engagement Bots: These scripts are designed to stimulate user activity. They target new or inactive users with “flirts” or “hotlist” adds. The timing of these interactions—often arriving in bursts immediately after sign-up or subscription expiry—suggests they are triggered by system events rather than human behavior.15
- Affiliate/Scam Bots: These are external scripts creating profiles to lure users off-platform. They typically use stolen photos and generic bios. Their objective is to move the user to a “verified” webcam site or a phishing page where credit card details can be harvested.20
4.2 The “Ashley’s Angels” Precedent
While FFN executives have denied the use of internal bots 24, the industry precedent set by the Ashley Madison leak is instructive. In that case, internal emails revealed the creation of “Ashley’s Angels”—tens of thousands of fake female profiles automated to engage paying male users. Given the similarity in business models and the shared “freemium” incentives, it is highly probable that similar mechanisms exist within AFF’s architecture to solve the “liquidity problem” (the ratio of active men to active women).
4.3 AI-Driven “Wingmen” and Deepfakes
The bot landscape has evolved significantly in the 2024-2025 period. Simple scripted bots are being replaced by Large Language Model (LLM) agents capable of sustaining complex conversations.
- The “Wingman” Phenomenon: New tools allow users to deploy AI agents to swipe and chat on their behalf, optimizing for engagement.7
- Deepfake Integration: Scammers now utilize Generative AI to create profile images that do not exist in reverse-image search databases. These “synthetic humans” allow scammers to bypass basic fraud detection filters that rely on matching photos to known celebrity or stock image databases.6
4.4 Technical Detection of Bot Activity
Users and researchers have identified specific heuristics for detecting bots on AFF:
- The “10-Minute Flood”: Receiving 20+ messages within 10 minutes of account creation is a primary indicator of automated targeting.16
- Syntax Repetition: Bots often reuse bio text or opening lines. Snippets indicate that bots frequently use “broken English” or generic phrases like “I love gaming too” without context.4
- Platform Migration: Any “user” who requests to move to Google Hangouts, Kik, or Telegram within the first few messages is, with near certainty, a script designed to bypass AFF’s keyword filters.26
5. Sextortion: The “Kill Chain” and Human Impact
Sextortion on Adult Friend Finder is not a nuisance; it is an organized industrial crime. The FBI has classified financially motivated sextortion as a significant threat, noting a massive increase in cases targeting both adults and minors.3
5.1 The Sextortion “Kill Chain”
The methodology used by sextortionists on AFF follows a rigid, optimized process known as a “kill chain.” Understanding this process is vital for disruption.
| Phase | Action | Mechanism |
| 1. Acquisition | Contact initiated on AFF. | Attacker uses a fake female profile (often “verified” via stolen credentials) to target users who appear vulnerable or affluent. |
| 2. Migration | Move to unmonitored channel. | “I hate this app, it’s so buggy. Let’s move to Skype/Snapchat/WhatsApp.” This removes the victim from AFF’s moderation tools.27 |
| 3. Grooming | Establish false intimacy. | Rapid escalation of romance (“Love Bombing”) or sexual availability. Exchange of “safe” photos (often AI-generated) to build trust.28 |
| 4. The Sting | Coerced explicit activity. | The victim is pressured into a video call. The attacker plays a pre-recorded loop of a woman stripping. The victim reciprocates. The attacker screen records the victim’s face and genitals.4 |
| 5. The Turn | Reveal and Threaten. | The “girl” disappears. A new message arrives: “I have recorded you. Look at this.” The victim receives the video file and a list of their Facebook friends/family/colleagues.29 |
| 6. Extraction | Financial Demand. | Demands for $500–$5,000 via Western Union, Gift Cards (Steam/Apple), or Cryptocurrency. Threats to ruin the victim’s marriage or career.4 |
5.2 The “Nudify” Threat and Generative AI
A disturbing evolution in 2024-2025 is “fabrication sextortion.” Attackers no longer need the victim to provide explicit material. Using AI “nudification” tools, attackers can take a standard face photo from a user’s AFF or Facebook profile and generate a realistic fake nude. They then threaten to release this fake image to the victim’s employer unless paid. This lowers the barrier to entry for extortionists, as they do not need to successfully groom the victim to initiate the blackmail.6
5.3 Victim Demographics and Suicide Risk
While AFF is an adult site, the victims of sextortion often include teenagers who lie about their age to access the platform. The FBI reports that the primary targets for financial sextortion are males aged 14–17, though older men on AFF are prime targets due to their financial resources and fear of reputational damage.4
The psychological toll is catastrophic. The FBI has linked over 20 suicides directly to financial sextortion schemes.5 Victims often feel isolated and unable to seek help due to the shame of being on an adult site. Case studies, such as the tragedy of Elijah Heacock, highlight how quickly these schemes can push victims to self-harm.31
6. Financial Forensics: “Zombie” Billing and Refunds
The financial operations of AFF exhibit characteristics of “grey hat” e-commerce, utilizing obfuscation to retain revenue and complicate cancellations.
6.1 “Zombie” Subscriptions
A persistent complaint involves “zombie” billing—charges that continue after a user believes they have cancelled.
- Mechanism: Users often subscribe to a “bundle” deal. Cancelling the main AFF membership may not cancel the bundled subscriptions to affiliate sites like Cams.com or Passion.com.32
- UI Friction: The cancellation process is intentionally convoluted, often requiring navigating through multiple “retention” screens offering discounts or free months. Failure to click the final “Confirm” button leaves the subscription active.33
- Auto-Renewal Default: Accounts are set to auto-renew by default. Disabling this often removes promotional pricing, effectively penalizing the user for seeking financial control.34
6.2 Billing Descriptor Obfuscation
To provide privacy (and arguably to obscure the source of charges), FFN uses vague billing descriptors on bank statements.
- Descriptors: Common descriptors include variations like “FFN*bill,” “Probiller,” “24-7 Help,” or generic LLC names that do not immediately signal “adult entertainment”.35
- Implication: While this protects users from spouses viewing statements, it aids credit card fraudsters. A thief using a stolen card to buy AFF credits can often go undetected for months because the line item looks like a generic utility or service charge.
6.3 The “Defective Product” Refund Strategy
FFN’s Terms of Service generally prohibit refunds. However, user communities have developed specific strategies to force refunds, often referred to as the “refund trick.”
- Technical: Users report success by filing disputes with their bank claiming the service was “defective” or “not as described” due to the prevalence of bots or the inability to access advertised features.37
- Regulatory Pressure: Citing specific FTC regulations regarding “negative option” billing or threatening to report the charge as fraud often escalates the ticket to a retention specialist authorized to grant refunds to avoid chargebacks.32
7. Legal Shields and Regulatory Arbitrage
FFN operates within a specific legal framework that largely immunizes it from the consequences of the activity on its platform.
7.1 Section 230 and Immunity
Section 230 of the Communications Decency Act (47 U.S.C. § 230) is the legal bedrock of AFF. It states that “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider”.39
- Application: This means FFN is generally not liable if a user is scammed, blackmailed, or harassed by another user (or a third-party bot). As long as FFN does not create the content, they are shielded. This creates a moral hazard where the platform has little financial incentive to aggressively purge bad actors.
- Exceptions: FOSTA-SESTA (2018) created an exception for platforms that “knowingly facilitate” sex trafficking. However, standard financial sextortion and romance scams do not typically fall under this exception, leaving Section 230 protections intact.39
7.2 The Arbitration Firewall
The case of Gutierrez v. FriendFinder Networks Inc. (2019) reveals the efficacy of FFN’s legal defenses. Following the 2016 data breach, a class-action lawsuit was filed. FFN successfully moved to compel arbitration based on the Terms of Use agreed to by the plaintiff.
- The Ruling: The court ruled that the “browse-wrap” or “click-wrap” agreement was valid. Consequently, the class action was dismissed, and the plaintiff was forced into individual arbitration.
- The Outcome: FFN paid zero dollars to the plaintiff or the class.8 This legal precedent effectively neutralizes the threat of collective legal action for data breaches, making it economically unfeasible for individual users to seek damages.
7.3 CCPA/GDPR and the “Right to Delete”
While the California Consumer Privacy Act (CCPA) and GDPR provide users the “right to be forgotten,” FFN’s implementation creates friction.
- Verification Barriers: To delete an account and all data, users must often provide proof of identity. For a user who wants to leave due to privacy concerns, the requirement to upload a government ID to a site that has already been breached is a significant deterrent.43
- Retention Loopholes: Privacy policies often contain clauses allowing data retention for “legal compliance” or “fraud prevention,” which can be interpreted broadly to keep data in cold storage indefinitely.44
8. Operational Security (OpSec) Guide for Investigations
For cybersecurity researchers, law enforcement, or individuals attempting to navigate this hostile environment, strict Operational Security (OpSec) is required.
8.1 Isolation and Compartmentalization
- The “Burner” Ecosystem: Never access AFF using a personal email or primary device.
- Email: Use a dedicated, encrypted email (e.g., ProtonMail, Tutanota).
- Phone: Do not link a primary mobile number. Use VoIP services (Google Voice, MySudo) for any required SMS verification, though be aware some platforms block VoIP numbers.
- Browser: Use a privacy-focused browser (Brave, Firefox with uBlock Origin) or a Virtual Machine (VM) to prevent browser fingerprinting and cookie leakage to ad networks.
8.2 Financial Anonymity
- Virtual Cards: Use services like Privacy.com to generate merchant-locked virtual credit cards. This prevents “zombie” billing (you can pause the card instantly) and keeps the merchant descriptor isolated from your main bank ledger.37
- Prepaid Options: Prepaid Visa/Mastercards bought with cash offer the highest anonymity but may be rejected by the platform’s fraud filters.
8.3 Interaction Protocols
- Zero Trust Messaging: Treat every initial contact as a bot or scammer.
- The “Turing Test”: Challenge interlocutors with context-specific questions that require visual or local knowledge (e.g., “What is the color of the object in the background of my second photo?”). Bots will fail this; humans will answer.
- Pattern Recognition: Be alert for the “Kill Chain” triggers:
- Request to move to Hangouts/WhatsApp.
- Unsolicited sharing of photos/links.
- Stories of financial distress or broken webcams.
9. Conclusion
Adult Friend Finder represents a digital paradox: it is a commercially successful, legally compliant business that simultaneously hosts a thriving ecosystem of fraud, extortion, and privacy violation. Its survival is secured not by the safety of its user experience, but by the legal shields of Section 230 and mandatory arbitration, which externalize the risks of data breaches and fraud onto the user.
For the personal user, the site poses a critical risk to privacy, financial security, and mental health. The probability of encountering automated deception approaches certainty, and the risk of sextortion is significant and potentially life-altering.
For the cybersecurity professional, AFF serves as a grim case study in the persistence of legacy vulnerabilities (SHA-1), the catastrophic failure of “soft delete” policies, and the evolving threat of AI-driven social engineering. It demonstrates that in the current digital landscape, the responsibility for safety lies almost entirely with the end-user, necessitating a defensive posture of extreme vigilance and zero trust.
Disclaimer:This report is for educational and informational purposes only. It details historical breaches and current threat vectors based on available forensic data. It does not constitute legal advice.
Works cited
- Largest hack of 2016? 412 million AdultFriendFinder accounts exposed – Bitdefender, accessed December 8, 2025, https://www.bitdefender.com/en-us/blog/hotforsecurity/largest-hack-of-2016-412-million-adultfriendfinder-accounts-exposed
- Adult Friend Finder and Penthouse hacked in massive personal data breach – The Guardian, accessed December 8, 2025, https://www.theguardian.com/technology/2016/nov/14/adult-friend-finder-and-penthouse-hacked-in-largest-personal-data-breach-on-record
- The state of sextortion in 2025 – Thorn.org, accessed December 8, 2025, https://www.thorn.org/blog/the-state-of-sextortion-in-2025/
- Financially Motivated Sextortion – FBI, accessed December 8, 2025, https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/sextortion/financially-motivated-sextortion
- The Financially Motivated Sextortion Threat – FBI, accessed December 8, 2025, https://www.fbi.gov/news/stories/the-financially-motivated-sextortion-threat
- Sextortion Scams Become More Threatening in 2025 – PR Newswire, accessed December 8, 2025, https://www.prnewswire.com/news-releases/sextortion-scams-become-more-threatening-in-2025-302409992.html
- AI ‘wingmen’ bots to write profiles and flirt on dating apps – The Guardian, accessed December 8, 2025, https://www.theguardian.com/lifeandstyle/2025/mar/08/ai-wingmen-bots-to-write-profiles-and-flirt-on-dating-apps
- FriendFinder Pays Nothing for Termination of Class Action Lawsuit – Business Wire, accessed December 8, 2025, https://www.businesswire.com/news/home/20200206005919/en/FriendFinder-Pays-Nothing-for-Termination-of-Class-Action-Lawsuit
- Friend Finder Networks – Grokipedia, accessed December 8, 2025, https://grokipedia.com/page/Friend_Finder_Networks
- Chatham Capital Holdings, Inc. v. Conru, No. 23-154 (2d Cir. 2024) – Justia Law, accessed December 8, 2025, https://law.justia.com/cases/federal/appellate-courts/ca2/23-154/23-154-2024-01-31.html
- CHATHAM CAPITAL HOLDINGS INC IV LLC v. John and Jane Does 1-5, Defendants. (2024) – FindLaw Caselaw, accessed December 8, 2025, https://caselaw.findlaw.com/court/us-2nd-circuit/115774602.html
- Gutierrez v. FriendFinder Networks Inc., No. 5:2018cv05918 – Document 54 (N.D. Cal. 2019), accessed December 8, 2025, https://law.justia.com/cases/federal/district-courts/california/candce/5:2018cv05918/332652/54/
- AdultFriendFinder review: Is the hookup site legit or a scam? – Mashable, accessed December 8, 2025, https://mashable.com/review/adult-friend-finder-review-dating-site
- AdultFriendFinder Review (Don’t Sleep on This OG Hookup Site) – VICE, accessed December 8, 2025, https://www.vice.com/en/article/adultfriendfinder-review/
- Read Customer Service Reviews of http://www.adultfriendfinder.com | 9 of 20 – Trustpilot Reviews, accessed December 8, 2025, https://nz.trustpilot.com/review/www.adultfriendfinder.com?page=9
- Read Customer Service Reviews of http://www.adultfriendfinder.com | 7 of 20 – Trustpilot, accessed December 8, 2025, https://www.trustpilot.com/review/www.adultfriendfinder.com?page=7
- AdultFriendFinder data breach – what you need to know – Tripwire, accessed December 8, 2025, https://www.tripwire.com/state-of-security/adultfriendfinder-data-breach-what-you-need-to-know
- Adult FriendFinder (2016) Data Breach – Have I Been Pwned, accessed December 8, 2025, https://haveibeenpwned.com/Breach/AdultFriendFinder2016
- Insights from the 2016 Adult Friend Finder Breach – Wolfe Systems, accessed December 8, 2025, https://wolfesystems.com.au/insights-from-the-2016-adult-friend-finder-breach/
- KnowBe4 Warns Employees Against “AdultFriendFinder” Scams, accessed December 8, 2025, https://www.knowbe4.com/press/knowbe4-warns-employees-against-adultfriendfinder-scams
- Adult Friend Finder Dump today! : r/hacking – Reddit, accessed December 8, 2025, https://www.reddit.com/r/hacking/comments/ak4ocm/adult_friend_finder_dump_today/
- Read Customer Service Reviews of http://www.adultfriendfinder.com | 6 of 20 – Trustpilot, accessed December 8, 2025, https://ie.trustpilot.com/review/www.adultfriendfinder.com?page=6
- AdultFriendFinder.com settles with FTC – iTnews, accessed December 8, 2025, https://www.itnews.com.au/news/adultfriendfindercom-settles-with-ftc-99054
- Scammers and Spammers: Inside Online Dating’s Sex Bot Con Job – David Kushner, accessed December 8, 2025, https://www.davidkushner.com/article/scammers-and-spammers-inside-online-datings-sex-bot-con-job/
- How do you recognize fake profiles and bots across any dating app? – Reddit, accessed December 8, 2025, https://www.reddit.com/r/OnlineDating/comments/103uuzh/how_do_you_recognize_fake_profiles_and_bots/
- Read Customer Service Reviews of http://www.adultfriendfinder.com | 2 of 20 – Trustpilot, accessed December 8, 2025, https://ca.trustpilot.com/review/www.adultfriendfinder.com?page=2
- Dealing with sexual extortion – eSafety Commissioner, accessed December 8, 2025, https://www.esafety.gov.au/key-topics/image-based-abuse/deal-with-sextortion
- Archived: Sextortion: It’s more common than you think – ICE, accessed December 8, 2025, https://www.ice.gov/features/sextortion
- Sextortion advice and guidance for adults – Internet Watch Foundation IWF, accessed December 8, 2025, https://www.iwf.org.uk/resources/sextortion/adults/
- Sextortion scams shaming victims – SAPOL, accessed December 8, 2025, https://www.police.sa.gov.au/sa-police-news-assets/front-page-news/sextortion-scams-shaming-victims
- A teen died after being blackmailed with A.I.-generated nudes. His family is fighting for change – CBS News, accessed December 8, 2025, https://www.cbsnews.com/news/sextortion-generative-ai-scam-elijah-heacock-take-it-down-act/
- Porn Sites are a scam but you can get full refunds + Cancelling a porn subscription – Reddit, accessed December 8, 2025, https://www.reddit.com/r/personalfinance/comments/iqle9o/porn_sites_are_a_scam_but_you_can_get_full/
- FTC Secures $14 Million Settlement with Match Group Over Deceptive Subscription Practices | Inside Privacy, accessed December 8, 2025, https://www.insideprivacy.com/consumer-protection/ftc-secures-14-million-settlement-with-match-group-over-deceptive-subscription-practices/
- Adult Friend Finder After 40: The Complete 2025 Guide – Beyond Ages, accessed December 8, 2025, https://beyondages.com/aff-for-mature-users/
- What Is Billing Descriptors? | Papaya Global, accessed December 8, 2025, https://www.papayaglobal.com/glossary/billing-descriptors/
- Is Your Billing Descriptor Responsible for Chargebacks?, accessed December 8, 2025, https://chargebacks911.com/about-billing-descriptor/
- Use this to refund all your purchases. : r/Priconne – Reddit, accessed December 8, 2025, https://www.reddit.com/r/Priconne/comments/127sbzl/use_this_to_refund_all_your_purchases/
- Read 619 Customer Reviews of AdultFriendFinder – Sitejabber, accessed December 8, 2025, https://www.sitejabber.com/reviews/adultfriendfinder.com
- Section 230: An Overview | Congress.gov, accessed December 8, 2025, https://www.congress.gov/crs-product/R46751
- Section 230 – Wikipedia, accessed December 8, 2025, https://en.wikipedia.org/wiki/Section_230
- 47 U.S. Code § 230 – Protection for private blocking and screening of offensive material, accessed December 8, 2025, https://www.law.cornell.edu/uscode/text/47/230
- FriendFinder Pays Nothing for Termination of Class Action Lawsuit – PR Newswire, accessed December 8, 2025, https://www.prnewswire.com/news-releases/friendfinder-pays-nothing-for-termination-of-class-action-lawsuit-300999739.html
- Your Rights | California Consumer Privacy Act – LiveRamp, accessed December 8, 2025, https://liveramp.it/privacy-policy-italia/california-privacy-notice/your-rights/
- Just how tough is-it to end an adultfriendfinder membership, accessed December 8, 2025, https://courseware.cutm.ac.in/just-how-tough-is-it-to-end-an-adultfriendfinder/
- California Consumer Privacy Act – LiftNet, accessed December 8, 2025, https://liftnet.com/privacy-policy/california-consumer-privacy-act/









