Privacy that proves it.
RealCloak makes AI extraction expensive and unreliable. It cloaks images & video (faces, postures, emotions), frustrates bots & scrapers, hardens paywalls, and adds authenticity attestation—so real users get through and automated abuse doesn’t.
What RealCloak solves
Revenue protection, user dignity, and honest attribution—without harming real users.
Bot & Scraper Mitigation
Stop credential-stuffing, ticket hoarding, data harvesting, and unfair automation with layered checks.
Authenticity Attestation
Prove content and actors are genuine: provenance checks, watermarks, integrity beacons.
Paywall Integrity
Protect metered/hard paywalls with risk-based gating, tokenized access, and leak tracing.
Link & Affiliate Protection
Clean, compliant link cloaking with leakage tracking and honest attribution.
Image & Video Cloak
Face/Posture/Emotion Blunting
Structure-aware perturbations and masks that reduce detector accuracy while remaining natural to humans.
Anti-Training Pollution
Low-visibility signals + provenance marks to lower dataset value and trace leaks.
EXIF/Metadata Hygiene
Scrub/shim EXIF/ICC/XMP, rotate safe profiles, randomize non-essential identifiers.
Use-cases (broad lanes)
Media & OTT
Block bot swarms, curb account sharing, watermark content, protect release windows.
Ticketing & Events
Prevent automated grabs, control concurrency, keep drops fair.
Finance & Commerce
Thwart sign-ups abuse & scraping of pricing/inventory.
APIs & SaaS
Rate-limit at the edge, attest callers, fence off high-value endpoints.
Research & Journals
Tokenized article access, leak canaries, institutional policy compliance.
Marketplaces & Forms
Detect automation, filter fake listings/leads, keep attribution honest.
How it works (high-level)
Risk Engine
Signals: IP/ASN/JA3, header entropy, device hints, velocity, geo-drift, behavior.
Adaptive Gating
Invisible checks → lightweight puzzles → OTP only when needed.
Tokenized Access
Short-lived, scope-bound tokens for pages, streams, or API rotators.
Leak Beacons
User-bound CSS/DOM beacons & canary identifiers for traceable leakage.
Good-bot Governance
Allowlists & schedules for search/social bots; everything else verifies.
Observability
Human vs bot curves, saved-revenue estimates, rule simulator, audit logs.
Deploy it your way
Online Service
Drop a file/URL, get a cloaked asset back. Roles, audit, and webhooks.
SDKs
JS/Python SDKs for apps and pipelines. Local processing; no data leaves your process.
REST API
Batch endpoints, async jobs, signed URLs. Fits FFmpeg/ImageMagick flows.
On-prem / Private Cloud
Containerized gateway with policy packs, mTLS, and SIEM hooks.
Make Your Move
Tell us your lane (Service · SDK · API · On-prem) and media types. We’ll map risks and fit the deployment.
Legal & Responsible Use
- ✔ RealCloak is for defensive privacy & authenticity—not for fraud, harassment, or evading lawful orders.
- ✔ Deployers must comply with laws (data-protection, anti-circumvention), platform policies, and user-consent requirements.
- ⚠ No technique is 100% against present/future models. Goal: raise cost, reduce accuracy, and lower training value.
- ✔ All product/company names belong to their owners; references are descriptive only.