I. Introduction
Online sexual extortion and blackmail, often called “sextortion,” is a form of abuse where a person threatens to expose, distribute, or publish sexual images, videos, messages, or private information unless the victim gives money, more sexual content, sexual favors, continued communication, or some other benefit.
In the Philippine context, sextortion is not merely an online scandal or private dispute. It may constitute several criminal offenses under Philippine law, including violence against women and children, cybercrime, unjust vexation, grave coercion, grave threats, blackmail-related extortion, child sexual abuse or exploitation, trafficking, voyeurism, and violations of data privacy laws, depending on the facts.
The conduct is especially harmful because it combines sexual humiliation, psychological coercion, reputational fear, and technological abuse. Victims are often pressured into silence because the blackmailer uses shame as a weapon. Philippine law, however, recognizes many of these acts as punishable offenses.
II. What Online Sexual Extortion Looks Like
Online sexual extortion may happen in many ways:
A person may secretly record a sexual video call and demand money. Someone may obtain intimate photos from a past relationship and threaten to send them to the victim’s family, classmates, employer, or social media contacts. A stranger may pretend to be romantically interested, persuade the victim to send nude photos, and later demand payment. An ex-partner may threaten to upload private sexual images after a breakup. A scammer may claim to have hacked the victim’s device and demand payment, even if the claim is false.
The threat may be explicit, such as “send money or I will post your nude photos,” or implied, such as repeatedly showing screenshots of the victim’s private images while demanding obedience. The demand does not have to be money. It may include more photos, sex, reconciliation, silence, passwords, access to accounts, or continued submission to the offender.
III. Core Legal Issue: Consent to Create or Send an Image Is Not Consent to Threaten or Distribute It
One of the most important principles is that consent to take, send, or share an intimate image with one person does not mean consent to distribute it to others.
A victim may have voluntarily sent a private sexual photo to a partner. That does not give the recipient the legal right to publish it, forward it, sell it, threaten to expose it, or use it for coercion. The wrong lies in the threat, coercion, unauthorized sharing, exploitation, or misuse of private sexual material.
This distinction matters because offenders often blame victims by saying, “You sent it anyway.” That is not a defense to blackmail, coercion, unauthorized distribution, or abuse.
IV. Philippine Laws That May Apply
There is no single Philippine law called the “Sextortion Law.” Instead, prosecutors and complainants may rely on several statutes, depending on the offender’s conduct, the victim’s age and sex, the relationship between the parties, and whether technology was used.
1. Cybercrime Prevention Act of 2012
The Cybercrime Prevention Act of 2012, or Republic Act No. 10175, is central where the offense is committed through computers, phones, social media, messaging apps, email, cloud storage, or other information and communications technology.
The law punishes certain cyber-related offenses and also increases penalties when crimes under the Revised Penal Code are committed through ICT. This is important because many acts of online sexual extortion involve traditional crimes—such as threats, coercion, or unjust vexation—committed through digital means.
Examples of relevant cyber-enabled conduct include:
- threatening to post intimate photos through Facebook, Instagram, TikTok, X, Telegram, Messenger, Viber, WhatsApp, email, or SMS;
- using fake accounts to contact the victim’s relatives or employer;
- demanding money through online messages;
- uploading or threatening to upload intimate material;
- hacking or unauthorized access to obtain private sexual content;
- using malware, phishing, or account takeover to steal images;
- identity theft, impersonation, or fake profiles used to extort.
The cybercrime law may also be relevant where the offender commits cyber libel, illegal access, data interference, misuse of devices, computer-related identity theft, or computer-related fraud.
2. Revised Penal Code: Threats, Coercion, Unjust Vexation, and Related Crimes
The Revised Penal Code may apply even if the act happens online.
Possible offenses include:
Grave threats may apply when the offender threatens to commit a wrong against the victim, such as exposing private sexual material, harming the victim’s reputation, or causing injury unless the victim complies.
Light threats may apply depending on the nature of the threat and demand.
Grave coercion may apply where the offender uses violence, threats, or intimidation to compel the victim to do something against their will, such as sending money, meeting in person, giving more intimate images, or staying in a relationship.
Unjust vexation may apply to conduct that causes annoyance, distress, torment, or emotional disturbance without necessarily fitting a more specific offense. Online harassment, repeated humiliation, and abusive messaging may fall here depending on the facts.
Robbery by intimidation or extortion-related offenses may be considered where the offender uses threats or intimidation to obtain money or property. The precise charge depends on the facts, the manner of intimidation, and prosecutorial assessment.
When these acts are committed through ICT, the Cybercrime Prevention Act may raise the penalty by one degree for covered Revised Penal Code crimes committed by means of information and communications technology.
3. Anti-Photo and Video Voyeurism Act of 2009
The Anti-Photo and Video Voyeurism Act of 2009, Republic Act No. 9995, is especially relevant where the offender records, copies, reproduces, distributes, sells, publishes, broadcasts, or exhibits photos or videos of a person’s private area or sexual act without consent.
The law may apply to:
- secret recording of sexual activity;
- recording a video call without consent;
- sharing an intimate photo or video without consent;
- uploading private sexual material online;
- sending intimate videos to third persons;
- threatening to distribute voyeuristic material;
- reproducing or copying private sexual images.
A key point is that the law targets the unauthorized recording, distribution, publication, or broadcasting of intimate material. Even if the victim consented to the sexual act itself, that does not automatically mean consent to record or share it.
4. Safe Spaces Act
The Safe Spaces Act, Republic Act No. 11313, also known as the Bawal Bastos Law, covers gender-based sexual harassment, including online sexual harassment.
Online gender-based sexual harassment may include acts that use information and communications technology to terrorize or intimidate victims through physical, psychological, and emotional threats; unwanted sexual remarks; invasion of privacy through cyberstalking; uploading or sharing media with sexual content; and other forms of online sexual harassment.
This law may be relevant where the offender:
- sends repeated unwanted sexual messages;
- threatens the victim with sexual humiliation;
- posts or threatens to post sexual content;
- creates fake accounts to shame or harass the victim;
- spreads sexual rumors;
- stalks the victim online;
- uses sexualized abuse to intimidate or silence the victim.
The Safe Spaces Act is particularly important because it recognizes that sexual harassment can happen in digital spaces, not only in physical workplaces, schools, or public places.
5. Violence Against Women and Their Children Act
The Anti-Violence Against Women and Their Children Act of 2004, Republic Act No. 9262, may apply when the victim is a woman and the offender is a current or former spouse, person with whom she has or had a sexual or dating relationship, or person with whom she has a child.
VAWC may cover psychological violence, sexual violence, economic abuse, harassment, and controlling behavior. Online sextortion by a partner or ex-partner may fall under VAWC when the threats cause mental or emotional suffering, public ridicule, humiliation, stalking, intimidation, or control.
Examples include:
- an ex-boyfriend threatening to post nude photos unless the woman resumes the relationship;
- a husband using intimate videos to control or punish his wife;
- a former partner threatening to send sexual images to the woman’s family or workplace;
- repeated online harassment causing emotional distress;
- coercing sexual acts through threats of exposure.
VAWC is significant because it recognizes abuse within intimate relationships and allows legal remedies such as criminal prosecution and protection orders.
6. Special Protection of Children Against Abuse, Exploitation and Discrimination Act
Where the victim is a minor, the legal consequences become much more serious.
Republic Act No. 7610, as amended and related child protection laws, protects children from abuse, exploitation, discrimination, and sexual exploitation. If the victim is under 18, sexual images, grooming, coercion, or threats involving sexual content may constitute child abuse, child sexual exploitation, or other serious offenses.
Even if the minor “consented,” the law treats children as needing special protection. A minor’s apparent consent is not treated the same way as adult consent, especially in sexual exploitation cases.
7. Anti-Online Sexual Abuse or Exploitation of Children and Anti-Child Sexual Abuse or Exploitation Materials Act
The Philippines has specific legislation addressing online sexual abuse or exploitation of children and child sexual abuse or exploitation materials. This is highly relevant where minors are induced, coerced, groomed, recorded, or blackmailed into producing sexual images or videos.
Acts involving minors may include:
- grooming a child online;
- asking a child to send nude photos;
- threatening to expose a child’s sexual images;
- livestreaming sexual abuse;
- possessing, producing, distributing, or selling child sexual abuse material;
- coercing a minor into more sexual content through threats;
- using payment platforms or online communications to facilitate exploitation.
In these cases, the offender may face severe penalties. The law also imposes duties on internet intermediaries, platforms, financial intermediaries, and relevant authorities to help address online child sexual abuse and exploitation.
8. Anti-Trafficking in Persons Act
The Anti-Trafficking in Persons Act, as amended, may apply if the sexual extortion involves exploitation, recruitment, transportation, transfer, harboring, receipt, or control of persons for sexual exploitation, pornography, forced labor, or similar purposes.
Online settings do not prevent a trafficking charge. If a person is coerced, deceived, or exploited into producing sexual content or performing sexual acts for the benefit of another, trafficking laws may be relevant.
9. Data Privacy Act of 2012
The Data Privacy Act, Republic Act No. 10173, may apply when the offender unlawfully processes, discloses, shares, or exposes personal information or sensitive personal information.
Sexual images, private messages, personal contact lists, addresses, workplace information, family details, and identity documents may all involve personal or sensitive personal information. Unauthorized publication or disclosure of such data may trigger data privacy concerns, especially when done to harass, shame, or extort.
However, not every private dispute automatically becomes a Data Privacy Act case. The specific facts matter, including whether there was unauthorized processing, malicious disclosure, improper access, or other covered conduct.
10. Civil Code Remedies
Aside from criminal liability, a victim may have civil remedies under the Civil Code, especially for damages caused by invasion of privacy, humiliation, mental anguish, besmirched reputation, social humiliation, or other injury.
Possible damages may include moral damages, exemplary damages, actual damages, and attorney’s fees, depending on the facts and proof.
A civil case may be separate from or connected to a criminal case. In criminal proceedings, civil liability may also arise from the offense.
V. Common Scenarios and Possible Legal Characterization
A. Stranger Records a Sexual Video Call and Demands Money
This may involve cybercrime, grave threats, coercion, extortion-related charges, voyeurism, and possibly computer-related fraud if deception was involved. If the victim is a minor, child sexual exploitation laws may apply.
B. Ex-Partner Threatens to Post Nude Photos After a Breakup
This may involve VAWC if the victim is a woman and the offender is a current or former intimate partner. It may also involve voyeurism, cybercrime, grave threats, coercion, unjust vexation, and civil liability.
C. Offender Creates a Fake Account and Sends the Victim’s Intimate Images to Friends
This may involve cybercrime, identity theft or impersonation, voyeurism, Safe Spaces Act violations, data privacy violations, unjust vexation, and civil damages.
D. Blackmailer Demands More Nude Photos Instead of Money
This is still sextortion. The demand does not need to be financial. It may involve coercion, sexual harassment, cybercrime, voyeurism, sexual exploitation, and, if the victim is a minor, child sexual abuse or exploitation.
E. Offender Threatens to Send Intimate Images to Employer
This may involve grave threats, coercion, cybercrime, data privacy violations, Safe Spaces Act violations, and civil claims for damages.
F. “I Hacked Your Camera” Scam Without Actual Images
Even if the offender has no real image, demanding money through a false hacking claim may still involve fraud, threats, coercion, cybercrime, or attempted extortion depending on the facts.
VI. The Role of Evidence
Evidence is critical. Victims should avoid deleting communications before preserving them.
Useful evidence may include:
- screenshots of threats;
- URLs or profile links;
- usernames, handles, phone numbers, email addresses;
- payment demands and wallet details;
- bank account or e-wallet information;
- timestamps;
- call logs;
- messages from Messenger, Viber, Telegram, WhatsApp, Instagram, TikTok, X, email, SMS, or dating apps;
- copies of posted content;
- proof that the offender contacted family, friends, school, or workplace;
- proof of emotional distress, reputational harm, or financial loss;
- police blotter or incident reports;
- affidavits of witnesses who received the material or saw the threats.
Screenshots are useful, but they should be preserved carefully. Where possible, victims should capture the full screen, visible date and time, profile information, account URL, and message thread context. Screen recordings may help show that the account and messages were live. Original files and metadata may also matter.
Victims should not alter, crop, or edit evidence in a way that may create doubts about authenticity. They may keep copies in secure storage and provide them to law enforcement or counsel.
VII. What Victims Should Do Immediately
A victim of online sexual extortion should prioritize safety, evidence preservation, and reporting.
First, preserve evidence. Take screenshots, record usernames, copy links, save messages, and document payment demands. Do not rely on the platform preserving the material forever.
Second, avoid further engagement when possible. Blackmailers often escalate when the victim negotiates. Paying does not guarantee deletion. In many cases, paying confirms that the victim can be pressured.
Third, secure accounts. Change passwords, enable two-factor authentication, review logged-in devices, revoke suspicious app access, and check recovery emails and phone numbers. If intimate content was obtained through hacking, account security becomes urgent.
Fourth, report the account or content to the platform. Social media platforms usually have reporting channels for non-consensual intimate imagery, harassment, impersonation, and child sexual abuse material.
Fifth, report to authorities. In the Philippines, victims may approach the Philippine National Police Anti-Cybercrime Group, the National Bureau of Investigation Cybercrime Division, local police stations, prosecutors, barangay VAW desks for VAWC-related cases, or child protection authorities if a minor is involved.
Sixth, seek legal and psychological support. Sextortion is traumatic. Victims often experience panic, shame, depression, fear, and isolation. Legal remedies are important, but emotional support is also necessary.
VIII. Reporting in the Philippines
A victim may report the incident to appropriate law enforcement or government agencies. Depending on the facts, possible reporting channels include:
- PNP Anti-Cybercrime Group for cybercrime-related complaints;
- NBI Cybercrime Division for cybercrime investigation;
- local police station for immediate blotter and referral;
- Office of the City or Provincial Prosecutor for criminal complaints;
- barangay VAW desk if the case involves violence against women;
- DSWD or child protection units if a minor is involved;
- school, employer, or platform trust and safety channels where relevant.
For minors, adults should act quickly and avoid circulating the images further. Even forwarding a minor’s sexual image “as evidence” to unnecessary persons may create legal and ethical problems. Evidence should be handled only through proper authorities and secure channels.
IX. Protection Orders and Immediate Relief
Where the offender is an intimate partner or former partner and the victim is covered by VAWC, protection orders may be available. These may include barangay protection orders, temporary protection orders, or permanent protection orders.
A protection order may prohibit the offender from contacting, harassing, threatening, stalking, or approaching the victim. It may also address other forms of abuse depending on the circumstances.
In non-VAWC cases, victims may still seek law enforcement assistance, prosecutorial action, platform takedowns, civil remedies, and other protective measures.
X. Liability of the Offender
An offender may face criminal, civil, and administrative consequences.
Criminal liability may include imprisonment, fines, or both, depending on the offense charged. Cybercrime-related offenses may carry higher penalties when technology is used. Child-related cases can carry especially severe penalties.
Civil liability may include damages for mental anguish, social humiliation, reputational harm, invasion of privacy, or financial losses.
Administrative consequences may arise if the offender is a student, employee, public officer, professional, or member of an organization subject to disciplinary rules. For example, a school or employer may impose sanctions for sexual harassment, misconduct, or violation of codes of conduct.
XI. Liability for Sharing or Forwarding Intimate Content
People who receive intimate images should not forward them. Sharing, reposting, saving, or encouraging distribution may expose the recipient to liability, especially if the content was shared without consent or involves a minor.
A person who says “I only forwarded it” may still be participating in the harm. Non-consensual intimate content should be reported and deleted, not circulated.
For child sexual abuse material, the rule is even stricter. Possession, distribution, or transmission may itself be criminal. The safest course is to report to proper authorities or the platform without spreading the material.
XII. Defenses Commonly Raised by Offenders
Offenders may claim that the victim voluntarily sent the photos. This does not justify threats or unauthorized distribution.
They may claim they were “just joking.” A threat may still be punishable if it caused fear, coercion, or distress, especially when supported by acts such as sending screenshots, naming intended recipients, or demanding compliance.
They may claim they never actually posted anything. The threat itself may still be punishable, depending on the offense.
They may claim the account was fake or hacked. This becomes an evidentiary question. Investigators may examine account activity, device links, IP-related records where lawfully obtainable, payment accounts, phone numbers, recovery emails, and witness testimony.
They may claim there was no money demanded. Sextortion does not always require money. Demands for sex, more photos, silence, reconciliation, or obedience may still support charges such as coercion, threats, harassment, exploitation, or abuse.
XIII. Special Concerns Involving Minors
When the victim is under 18, the case should be treated as a child protection matter. Adults should avoid blaming, shaming, or interrogating the child in a way that worsens trauma.
Important principles include:
- the child is not at fault for being groomed, manipulated, or coerced;
- apparent consent does not erase exploitation;
- images should not be circulated;
- school authorities should protect the child’s privacy;
- parents or guardians should report promptly;
- law enforcement and social workers may need to coordinate;
- psychological support may be necessary;
- the offender may face child exploitation, cybercrime, trafficking, or abuse charges.
Minors may also be pressured by other minors. The age of the offender matters, but the harm and need for intervention remain serious.
XIV. Sextortion by Foreign or Anonymous Offenders
Many sextortion schemes are transnational. The offender may be outside the Philippines, may use fake names, fake photos, VPNs, stolen accounts, cryptocurrency, or foreign payment channels.
This complicates investigation but does not make the case hopeless. Victims may still preserve evidence, report accounts, request takedowns, notify platforms, and file reports with Philippine authorities. Law enforcement may coordinate with foreign counterparts in serious cases, especially where children, organized crime, or repeated victims are involved.
The practical challenge is identification. Payment details, account recovery data, phone numbers, email addresses, reused usernames, IP logs, device identifiers, and linked accounts may assist investigators if obtained through lawful processes.
XV. Platform Takedowns and Non-Consensual Intimate Images
Most major platforms prohibit non-consensual intimate imagery. A victim may report the material as:
- non-consensual intimate image abuse;
- harassment or bullying;
- sexual exploitation;
- impersonation;
- privacy violation;
- child sexual abuse material, if applicable.
Victims should preserve evidence before reporting, because platforms may remove the content and make it harder for the victim to document what happened. However, if the content involves a child, removal and reporting should be urgent.
Some platforms also allow “hashing” or preventive measures to stop re-uploading of intimate images. This can help reduce repeated distribution.
XVI. Privacy, Shame, and Victim-Blaming
Sextortion thrives on shame. Victims often fear that reporting will make things worse. They may worry that police, family, employers, or schools will judge them.
Legally and ethically, the focus should be on the offender’s coercive and abusive conduct. The victim’s private sexual life does not justify blackmail. A person’s mistake, trust, or vulnerability is not permission for exploitation.
Victim-blaming can also discourage reporting and embolden offenders. In many cases, early reporting prevents greater harm.
XVII. Remedies Available to Victims
Victims may consider several remedies:
Criminal complaint. This seeks prosecution of the offender.
Protection order. Available in VAWC situations and possibly other protective frameworks depending on the facts.
Platform takedown. This seeks removal of content or disabling of abusive accounts.
Civil action for damages. This seeks compensation for harm suffered.
School or workplace complaint. Relevant where the offender is part of the same institution.
Data privacy complaint. Possible where unauthorized disclosure or misuse of personal data is involved.
Child protection intervention. Required where the victim is a minor.
The best remedy depends on urgency, evidence, identity of the offender, victim’s age, relationship between parties, and whether content has already been distributed.
XVIII. Practical Legal Checklist for Victims
A victim should document the following:
- Name, alias, username, or profile of the offender.
- Link to the account or post.
- Screenshots of threats and demands.
- Date and time of each message.
- What the offender demanded.
- What material the offender claims to possess.
- Whether the material was actually posted or sent.
- Names of people who received or saw the material.
- Payment account, wallet, bank, or remittance details.
- Whether the offender is a partner, ex-partner, stranger, classmate, coworker, or family member.
- Whether the victim is a minor.
- Whether hacking, fake accounts, impersonation, or stalking occurred.
- Emotional, financial, reputational, or professional harm suffered.
- Any prior abuse, threats, or pattern of control.
This information helps determine whether the case is primarily cybercrime, VAWC, voyeurism, child exploitation, coercion, threats, harassment, data privacy violation, or a combination of offenses.
XIX. For Parents, Schools, and Employers
Parents should respond calmly and protectively. A child or teenager who is being blackmailed may be terrified. Anger, blame, or punishment can push the child into silence. The priority should be safety, evidence, reporting, takedown, and emotional support.
Schools should treat sextortion as a safeguarding issue, not gossip or discipline against the victim. They should prevent bullying, preserve confidentiality, and coordinate with parents and authorities where appropriate.
Employers should avoid punishing employees merely because they were victimized. If an offender threatens to send intimate images to a workplace, the employer should treat the employee as a victim of abuse and take steps to prevent harassment, discrimination, or further circulation.
XX. Ethical and Legal Responsibilities of Bystanders
A bystander who receives intimate content should not share it, mock the victim, or ask to see more. The proper response is to:
- refuse to forward the material;
- tell the victim, if safe and appropriate;
- report the post or account;
- preserve limited evidence if necessary;
- avoid downloading or storing sexual material involving minors;
- cooperate with authorities when needed.
The culture of forwarding scandalous content is part of the harm. It may also create legal exposure.
XXI. Preventive Measures
Prevention cannot eliminate the offender’s responsibility, but individuals can reduce risk by practicing digital safety:
- use strong passwords and two-factor authentication;
- avoid reusing passwords;
- secure cloud backups;
- review privacy settings;
- be cautious with strangers who quickly sexualize conversations;
- avoid showing identifiable details in intimate images;
- do not send intimate content under pressure;
- be wary of sudden video-call seduction by unknown accounts;
- avoid clicking suspicious links;
- keep devices updated;
- cover webcams when not in use;
- monitor logged-in sessions;
- limit public access to friend lists and family contacts.
Still, prevention advice must not become victim-blaming. The offender remains responsible for blackmail, coercion, or exploitation.
XXII. When the Victim Paid the Blackmailer
Payment does not make the victim guilty. Many victims pay out of fear. However, paying may encourage further demands. Victims who already paid should preserve payment proof, including receipts, transaction IDs, account names, phone numbers, QR codes, wallet addresses, bank details, or remittance records.
Those records may help identify the offender or show the extortion demand.
XXIII. When the Offender Has Already Posted the Content
If the content has already been posted, the victim should preserve evidence before requesting takedown where possible. Evidence may include screenshots, URLs, timestamps, account names, comments, shares, and identities of those who received or reposted the material.
The victim may report the content to the platform and to law enforcement. If the content involves a minor, it should be reported urgently as child sexual abuse or exploitation material.
XXIV. Online Sexual Extortion as Gender-Based Violence
Although anyone can be a victim, women and girls are often targeted through sexual shame, reputational threats, and patriarchal double standards. Philippine laws such as VAWC and the Safe Spaces Act are particularly relevant because they recognize psychological, sexual, and gender-based harms.
Men and boys can also be victims, especially in financial sextortion scams. LGBTQ+ persons may be targeted through threats of outing, sexual humiliation, or exposure to family or community. Legal protection should focus on coercion, exploitation, privacy invasion, and harm, regardless of gender.
XXV. Potential Charges: How Lawyers and Prosecutors May Analyze the Case
A lawyer or prosecutor may ask:
Was there a threat? Was there a demand? Was money, sex, silence, or another benefit demanded? Was intimate content recorded or shared without consent? Was the victim a minor? Was the offender a partner or ex-partner? Was the act committed online or through ICT? Was there hacking or impersonation? Was the content actually distributed? Did the offender contact third parties? Was there psychological harm? Was there financial loss? Was the conduct repeated? Were there multiple victims?
From these facts, the case may be framed under one or more laws: cybercrime, voyeurism, VAWC, Safe Spaces Act, child protection laws, trafficking laws, Revised Penal Code offenses, data privacy law, or civil damages.
Multiple charges may arise from the same set of facts. For example, an ex-boyfriend who threatens to post nude photos unless the victim returns to him may face VAWC, grave threats or coercion, cybercrime-related charges, and voyeurism-related charges, depending on proof.
XXVI. Importance of Legal Counsel
Because sextortion cases often involve overlapping laws, legal counsel can help identify the strongest complaint, preserve evidence properly, avoid unnecessary exposure of intimate material, prepare affidavits, coordinate with law enforcement, and seek protective remedies.
Legal counsel is especially important where the victim is a minor, the offender is abroad, the content has already spread, the offender is a partner or ex-partner, or the case involves school, workplace, or public exposure.
XXVII. Conclusion
Online sexual extortion and blackmail in the Philippines is a serious legal matter. It may involve cybercrime, threats, coercion, voyeurism, gender-based sexual harassment, violence against women, child sexual exploitation, trafficking, data privacy violations, and civil liability.
The central legal and moral point is clear: private sexual content must not be used as a weapon. Consent to intimacy is not consent to blackmail. Consent to share with one person is not consent to public exposure. Shame belongs to the offender, not the victim.
Victims should preserve evidence, secure accounts, avoid further submission to demands, report to proper authorities and platforms, and seek legal and emotional support. Philippine law provides several pathways for accountability, protection, and redress.