project screenshot 1
project screenshot 2
project screenshot 3
project screenshot 4
project screenshot 5
project screenshot 6

Creepy䜑

A "Revoke.cash" like browser extension, but for women safety.

Creepy䜑

Created At

ETHGlobal Bangkok

Project Description

This project has two parts:

  1. a browser extension that users can click to check if the person she is talking to online is suspicious, suspicious metrics includes past news and how many people issued about this person. If that person is suspicious, extension will pop-up a red flag alert and attach a action suggestion guider.
  2. a report website where users to issue and community members to vote a suspicious person or a incident includes a suspicious person.

How it's Made

  1. User Interaction via Browser Extension:
    • The user installs the browser extension built with JavaScript, HTML, and CSS.
    • The extension collects user interactions on networking platforms.
  2. Data Submission and Storage:
    • When a report is submitted, it is encrypted using asymmetric or symmetric cryptography.
    • The encrypted data is sent to a backend API, which interacts with smart contracts on the blockchain for storage.
    • Relevant metadata (like hashes) is stored on-chain while detailed reports are stored on IPFS.
  3. Data Retrieval for Alerts:
    • The extension queries the blockchain through the backend API to check if any interactions involve users with harassment records.
    • If a match is found, the extension triggers a notification alerting the user of potential risks.
  4. Privacy Assurance:
    • All personal information remains encrypted both in transit and at rest.
    • Users have control over their data, deciding what to share and with whom through secure authentication mechanisms.
  5. Community Reporting Mechanism:
    • Users can submit reports through the extension interface.
    • Reports are aggregated from various sources using web scraping techniques or APIs from news outlets to maintain an up-to-date database of suspicious individuals.

By piecing together these technologies effectively, you can create a robust browser extension that enhances safety during networking while ensuring privacy and security for users involved in sensitive reporting activities.

background image mobile

Join the mailing list

Get the latest news and updates