{"id":1197,"date":"2024-04-19T00:00:00","date_gmt":"2024-04-19T00:00:00","guid":{"rendered":"https:\/\/digitalinvestigation.com\/blog\/?p=1197"},"modified":"2025-04-10T19:48:15","modified_gmt":"2025-04-10T19:48:15","slug":"tiktok-sextortion-what-to-do-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/","title":{"rendered":"TikTok Sextortion: What to Do &#038; How to Protect Yourself"},"content":{"rendered":"<p>Sextortion is a real and growing problem, and one that users of TikTok\u2014and other social media platforms \u2013 need to be aware of. Criminals can use explicit images or videos taken without the victim&#8217;s consent to extort money, sexual favors, or even just to embarrass the victim. But there are steps you can take to protect yourself from sextortion, and we&#8217;ll tell you what they are.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1446 size-full\" src=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion.jpeg\" alt=\"TikTok Sextortion\" width=\"1500\" height=\"1000\" srcset=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion.jpeg 1500w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-150x100.jpeg 150w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-300x200.jpeg 300w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-768x512.jpeg 768w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-1024x683.jpeg 1024w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-512x341.jpeg 512w, https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-920x613.jpeg 920w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Does_Sextortion_on_TikTok_Happen\"><\/span>How Does Sextortion on TikTok Happen?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/TikTok\">TikTok<\/a> as a platform has skyrocketed to success due to the trendy dances, funny videos, and wild adventures told by its users. The platform has over 1 billion users worldwide and has captivated the attention of people of all ages and backgrounds. Due to the wild success of the platform, it has also caught the attention of a more malicious group of people \u2013 sextortionists.<\/p>\n<p>These cybercriminals come onto social media platforms and create fake profiles also known as \u201ccatfish\u201d profiles and reach out to users to start a flirtatious conversation that leads to them manipulating their potential victims to send explicit content in which they save and threaten to expose online if they are not compensated. This is called TikTok sextortion.<\/p>\n<p>Sextortionists are aware of the limited chatting features the app provides its users and the potential banning of their account if they were to get caught in their crime due to TikTok\u2019s vigilant community guidelines. What they do instead is find a target and get them to switch to other social media platforms like Instagram or Facebook to talk more and eventually exchange explicit content. Moving communication to these specific platforms is also beneficial for these criminals because the platforms are known for not taking down accounts as promptly as they should.<\/p>\n<p>Sextortionists also ask you to switch platforms so that they have other outlets to expose your content on. It is crucial to remain cautious and vigilant when communicating with strangers online, especially when dealing with <a href=\"\/blog\/sextortion\/instagram-sextortion-scam\/\">sextortion on Instagram<\/a>, or <a href=\"\/blog\/sextortion\/do-sextortionists-follow-through-on-facebook\/\">Facebook sextortion<\/a>, or any other social media platform.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Protect_Yourself_from_TikTok_Sextortion\"><\/span>How to Protect Yourself from TikTok Sextortion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To protect yourself from becoming a target of TikTok sextortion, there are some things you should know and take into account.<\/p>\n<ul>\n<li>Keep your account private with strong privacy settings<\/li>\n<li>Be aware of random strangers that message you out of the blue who are aggressively flirtatious or sexual<\/li>\n<li>Keep conversations on one platform, do not share your other social media handles<\/li>\n<li>If you ever feel unsafe or unsure about someone online, end the conversation, block them right away, and report their account<\/li>\n<li>Most importantly, do not for any reason send explicit content to anyone especially a stranger online<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"What_to_Do_If_Youre_a_Victim_of_Sextortion_on_TikTok\"><\/span>What to Do If You\u2019re a Victim of Sextortion on TikTok<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Sextortion on TikTok can be tough for anyone to deal with, if you are a victim, it\u2019s important to reach out for help and avoid handling this on your own. Here are some tips you should take once you are faced with a sextortionist.<\/p>\n<p>Firstly, it\u2019s going to be almost impossible to <a href=\"\/blog\/sextortion\/should-i-ignore-sextortion\/\">ignore your harasser<\/a> since they have your information and have various ways to contact you and your loved ones. That being said, do not ignore them, and do not pay them a dime. Play along with their scheme and pretend as though you are going to pay them but they have to wait until you have access to the amount they are asking for. This gives you time to get help from professionals so they can take over for you.<\/p>\n<p>Secondly, you should document your entire interaction with the suspect and immediately contact your local authorities and the FBI to report the harassment. It\u2019s also important to reach out to a blackmail specialist that can take over for you promptly while you wait for results from authorities.<\/p>\n<p>Lastly, keep calm and find as much support as you can. This is understandably a very hard time and having a strong support system will make this process less lonely and isolating.<\/p>\n<p>Cyber sextortion is thriving on almost every social media platform online and people are becoming victims every day. We hope that you utilize these tips if you are ever put in this terrible predicament and remember to never be afraid to reach out for help the minute it happens. If you need assistance today, call our <a href=\"\/blog\/about-sextortion\/\">sextortion helpline<\/a> or chat with us online, we are available 24\/7 and want to help you put this burden to rest.<\/p>\n","protected":false},"excerpt":{"rendered":"Sextortion is a real and growing problem, and one that users of TikTok\u2014and other social media platforms \u2013&hellip;","protected":false},"author":1,"featured_media":1201,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-1197","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-sextortion","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>TikTok Sextortion: What to Do and How to Protect Yourself<\/title>\n<meta name=\"description\" content=\"How Does Sextortion on TikTok Happen? Here&#039;s What You Need to Know About TikTok Sextortion &amp; How to Protect Yourself\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TikTok Sextortion: What to Do and How to Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"How Does Sextortion on TikTok Happen? Here&#039;s What You Need to Know About TikTok Sextortion &amp; How to Protect Yourself\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PDInvestigate\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-10T19:48:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Derek J. Langford\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"TikTok Sextortion: What to Do and How to Protect Yourself\" \/>\n<meta name=\"twitter:description\" content=\"How Does Sextortion on TikTok Happen? Here&#039;s What You Need to Know About TikTok Sextortion &amp; How to Protect Yourself\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion.jpeg\" \/>\n<meta name=\"twitter:creator\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:site\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek J. Langford\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/\"},\"author\":{\"name\":\"Derek J. Langford\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\"},\"headline\":\"TikTok Sextortion: What to Do &#038; How to Protect Yourself\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-04-10T19:48:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/\"},\"wordCount\":747,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg\",\"articleSection\":[\"Sextortion Victim Support\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/\",\"name\":\"TikTok Sextortion: What to Do and How to Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg\",\"datePublished\":\"2024-04-19T00:00:00+00:00\",\"dateModified\":\"2025-04-10T19:48:15+00:00\",\"description\":\"How Does Sextortion on TikTok Happen? Here's What You Need to Know About TikTok Sextortion & How to Protect Yourself\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg\",\"width\":736,\"height\":150,\"caption\":\"TikTok Sextortion: What to Do & How to Protect Yourself\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/sextortion\\\/tiktok-sextortion-what-to-do-how-to-protect-yourself\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TikTok Sextortion: What to Do &#038; How to Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"name\":\"Articles on Sextortion & Blackmail - Expert Advice on the Blog\",\"description\":\"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\",\"name\":\"Digital Investigations\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"width\":216,\"height\":65,\"caption\":\"Digital Investigations\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PDInvestigate\",\"https:\\\/\\\/x.com\\\/PDInvestigate\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalinvestigation\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCc5KctfM3-tMserIsMhWUrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/898a7a205c38960db07f9a490d1c3d82\",\"name\":\"Derek J. Langford\",\"description\":\"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.\",\"sameAs\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TikTok Sextortion: What to Do and How to Protect Yourself","description":"How Does Sextortion on TikTok Happen? Here's What You Need to Know About TikTok Sextortion & How to Protect Yourself","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"TikTok Sextortion: What to Do and How to Protect Yourself","og_description":"How Does Sextortion on TikTok Happen? Here's What You Need to Know About TikTok Sextortion & How to Protect Yourself","og_url":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/","og_site_name":"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog","article_publisher":"https:\/\/www.facebook.com\/PDInvestigate","article_published_time":"2024-04-19T00:00:00+00:00","article_modified_time":"2025-04-10T19:48:15+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion.jpeg","type":"image\/jpeg"}],"author":"Derek J. Langford","twitter_card":"summary_large_image","twitter_title":"TikTok Sextortion: What to Do and How to Protect Yourself","twitter_description":"How Does Sextortion on TikTok Happen? Here's What You Need to Know About TikTok Sextortion & How to Protect Yourself","twitter_image":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion.jpeg","twitter_creator":"@PDInvestigate","twitter_site":"@PDInvestigate","twitter_misc":{"Written by":"Derek J. Langford","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/"},"author":{"name":"Derek J. Langford","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82"},"headline":"TikTok Sextortion: What to Do &#038; How to Protect Yourself","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-04-10T19:48:15+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/"},"wordCount":747,"publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg","articleSection":["Sextortion Victim Support"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/","url":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/","name":"TikTok Sextortion: What to Do and How to Protect Yourself","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg","datePublished":"2024-04-19T00:00:00+00:00","dateModified":"2025-04-10T19:48:15+00:00","description":"How Does Sextortion on TikTok Happen? Here's What You Need to Know About TikTok Sextortion & How to Protect Yourself","breadcrumb":{"@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/#primaryimage","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/08\/tiktok-sextortion-what-to-do-how-to-protect-yourself.jpg","width":736,"height":150,"caption":"TikTok Sextortion: What to Do & How to Protect Yourself"},{"@type":"BreadcrumbList","@id":"https:\/\/digitalinvestigation.com\/blog\/sextortion\/tiktok-sextortion-what-to-do-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalinvestigation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"TikTok Sextortion: What to Do &#038; How to Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/digitalinvestigation.com\/blog\/#website","url":"https:\/\/digitalinvestigation.com\/blog\/","name":"Articles on Sextortion & Blackmail - Expert Advice on the Blog","description":"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less","publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalinvestigation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalinvestigation.com\/blog\/#organization","name":"Digital Investigations","url":"https:\/\/digitalinvestigation.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","width":216,"height":65,"caption":"Digital Investigations"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PDInvestigate","https:\/\/x.com\/PDInvestigate","https:\/\/www.linkedin.com\/company\/digitalinvestigation","https:\/\/www.youtube.com\/channel\/UCc5KctfM3-tMserIsMhWUrg"]},{"@type":"Person","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/898a7a205c38960db07f9a490d1c3d82","name":"Derek J. Langford","description":"Derek J. Langford is the author of the Digital Investigation blog. He is 36 years old and has two children. He advises people on how to protect themselves from blackmail, sextortion, cyberbullying, and online harassment.","sameAs":["https:\/\/digitalinvestigation.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/1197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/comments?post=1197"}],"version-history":[{"count":3,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/1197\/revisions"}],"predecessor-version":[{"id":5491,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/1197\/revisions\/5491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media\/1201"}],"wp:attachment":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media?parent=1197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/categories?post=1197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/tags?post=1197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}