PRIV ProtocolPRIV Docs
Data Bounty Board

Fraud Protection

Security measures, fraud detection mechanisms, penalty tiers, and the appeal process for the Data Bounty Board.

Overview

The Data Bounty Board employs multiple layers of fraud protection to ensure fair payouts for legitimate contributors and protect bounty creators from low-quality or fraudulent submissions.

Detection Mechanisms

Automated Detection

┌─────────────────────────────────────────────────────────────────┐
│                    Fraud Detection Pipeline                      │
├─────────────────────────────────────────────────────────────────┤
│                                                                 │
│  Submission                                                     │
│      │                                                          │
│      ▼                                                          │
│  ┌─────────────────┐                                           │
│  │  Hash Check     │ ← Detect exact duplicates                 │
│  └────────┬────────┘                                           │
│           │                                                     │
│           ▼                                                     │
│  ┌─────────────────┐                                           │
│  │  Perceptual     │ ← Detect near-duplicates                  │
│  │  Hash Check     │   (cropped, resized, filtered)            │
│  └────────┬────────┘                                           │
│           │                                                     │
│           ▼                                                     │
│  ┌─────────────────┐                                           │
│  │  AI Detection   │ ← Detect AI-generated content             │
│  └────────┬────────┘                                           │
│           │                                                     │
│           ▼                                                     │
│  ┌─────────────────┐                                           │
│  │  Metadata       │ ← Detect spoofed/fake metadata            │
│  │  Analysis       │                                           │
│  └────────┬────────┘                                           │
│           │                                                     │
│           ▼                                                     │
│  ┌─────────────────┐                                           │
│  │  Behavioral     │ ← Detect suspicious submission patterns   │
│  │  Analysis       │                                           │
│  └────────┬────────┘                                           │
│           │                                                     │
│           ▼                                                     │
│  Pass / Flag / Block                                           │
│                                                                 │
└─────────────────────────────────────────────────────────────────┘

Hash-Based Detection

SHA-256 Exact Match

Every submission is hashed using SHA-256. Identical files are instantly detected:

// How files are hashed
async function hashFile(file: ArrayBuffer): Promise<string> {
  const hashBuffer = await crypto.subtle.digest('SHA-256', file);
  const hashArray = Array.from(new Uint8Array(hashBuffer));
  return hashArray.map(b => b.toString(16).padStart(2, '0')).join('');
}

Perceptual Hashing

For images and videos, perceptual hashes detect near-duplicates:

Modification DetectedExample
CroppingTrimming edges
ResizingUpscaling/downscaling
Rotation90/180/270 degrees
FlippingMirror images
Color adjustmentsBrightness, contrast
Minor filtersInstagram-style filters
CompressionRe-saving as lower quality

AI Content Detection

Multiple AI detection systems analyze submissions:

SystemDetection Type
Statistical analysisPixel distribution patterns
Artifact detectionAI-specific generation artifacts
Model fingerprintingSignatures of known AI models
Metadata analysisMissing/fake EXIF data
Style analysisCharacteristic AI styles

AI detection continues to improve. Content that passes today may be flagged in future scans.

Behavioral Analysis

The system monitors submission patterns:

PatternSuspicion Level
Submissions faster than humanly possibleHigh
Identical timestamps across submissionsHigh
Same IP with multiple accountsHigh
Unusual geographic patternsMedium
Consistent quality across unrelated topicsMedium
Batch submissions with sequential filenamesLow-Medium

Cross-Platform Checks

Reverse image/video searches detect:

  • Stock photos
  • Previously published content
  • Content from other data platforms
  • Stolen social media content

Penalty Tiers

Tier Overview

TierReputation LossCooldownEarnings ImpactReview Required
Warning0NoneNoneNo
Minor-51 dayNoneNo
Moderate-207 daysForfeitedNo
Severe-5030 daysForfeitedYes
Permanent Ban-100ForeverForfeitedYes

Warning

Trigger: First minor quality issue

Consequences:

  • Submission rejected
  • No reputation penalty
  • Educational notification sent

Example violations:

  • Slightly below quality threshold
  • Missing optional metadata
  • Minor format issues

Minor Penalty

Trigger: Repeated quality issues, minor rule violations

Consequences:

  • -5 reputation points
  • 24-hour cooldown from submissions
  • Submission rejected

Example violations:

  • Multiple quality rejections
  • Incorrect metadata (unintentional)
  • Submitting to wrong category

Moderate Penalty

Trigger: Significant violations, pattern of issues

Consequences:

  • -20 reputation points
  • 7-day cooldown
  • Pending earnings forfeited
  • Account flagged for monitoring

Example violations:

  • PII in submission
  • Misrepresenting content
  • Attempting duplicate submissions
  • Minor consent violations

Severe Penalty

Trigger: Serious rule violations, fraud attempts

Consequences:

  • -50 reputation points
  • 30-day suspension
  • All pending earnings forfeited
  • Manual review required to return

Example violations:

  • AI content with deception
  • Stolen content
  • Multiple accounts
  • Hate speech or explicit content
  • Serious consent violations

Permanent Ban

Trigger: Critical violations, repeated severe violations

Consequences:

  • Account terminated
  • All earnings forfeited
  • Wallet address blacklisted
  • Cannot create new accounts

Example violations:

  • CSAM (reported to authorities)
  • Organized fraud
  • Identity theft
  • Threats or harassment
  • 2+ severe violations

Wallet Blacklist

How It Works

Wallets associated with banned accounts are permanently blocked:

Banned Account

    ├── Primary wallet → Blacklisted

    ├── Associated wallets → Blacklisted
    │   (from same IP, linked transactions)

    └── Future attempts → Blocked on connect

What Gets Blacklisted

Wallet RelationshipBlacklisted
Primary connected walletYes
Wallets used from same IPYes
Wallets with direct transfers to/from primaryFlagged for review
ENS names pointing to blacklisted addressesYes

Blacklist Persistence

  • Blacklist is permanent
  • Cannot be removed through appeal (for permanent bans)
  • Shared across all PRIV Protocol services
  • Used by partner platforms (optional data sharing)

IP Tracking

What We Track

Data PointPurposeRetention
IP address (hashed)Fraud prevention90 days
Geolocation (country only)Geographic restrictions90 days
Connection timestampsPattern analysis30 days
Device fingerprintMulti-account detection30 days

Privacy Safeguards

IP addresses are immediately hashed. We cannot and do not see your actual IP address, only a one-way hash used for fraud detection.

How IP hashing works:

// IP is hashed with a secret salt
const ipHash = await hashWithSalt(ipAddress, IP_HASH_SALT);

// Only the hash is stored
// Original IP cannot be recovered from hash
database.store({ ipHash, timestamp });

What we DON'T do:

  • Store raw IP addresses
  • Share IP data with bounty creators
  • Track your browsing outside PRIV
  • Sell location data

Appeal Process

When You Can Appeal

ViolationAppealable
WarningNo (no penalty to appeal)
Minor penaltyYes
Moderate penaltyYes
Severe penaltyYes
Permanent banLimited cases only
CSAM violationsNo (reported to authorities)

How to Appeal

Step 1: Review the Violation

Check your notification for:

  • Specific violation cited
  • Evidence provided
  • Deadline for appeal (7 days)

Step 2: Gather Evidence

Collect supporting documentation:

  • Original files (RAW, source files)
  • Proof of creation (timestamps, project files)
  • Receipts/licenses (if using licensed content)
  • Context for misunderstandings

Step 3: Submit Appeal

# API: Submit appeal
curl -X POST https://api.privlabs.io/v1/b2b/appeals \
  -H "Authorization: Bearer your_token" \
  -H "Content-Type: application/json" \
  -d '{
    "violationId": "vio_x1y2z3",
    "reason": "False positive - content is original",
    "explanation": "This photo was taken by me on January 15, 2026...",
    "evidenceUrls": [
      "https://example.com/raw_file.arw",
      "https://example.com/metadata_screenshot.png"
    ]
  }'

Step 4: Wait for Review

Appeal TypeReview Time
Minor penalty24-48 hours
Moderate penalty3-5 business days
Severe penalty5-10 business days
Permanent ban10-14 business days

Appeal Outcomes

OutcomeResult
UpheldOriginal penalty stands
ReducedPenalty lowered (e.g., severe -> moderate)
OverturnedPenalty removed, reputation restored
EscalatedRequires additional review

What Helps Appeals

  • Clear evidence of original creation
  • Timestamps that predate submission
  • RAW or source files
  • Logical explanation for misunderstanding
  • Clean account history

What Hurts Appeals

  • No supporting evidence
  • Contradictory claims
  • History of violations
  • Hostile or threatening language
  • Lies or fabrications (makes it worse)

Reporting Fraud

How to Report

If you suspect fraud by another user:

# API: Flag submission
curl -X POST https://api.privlabs.io/v1/b2b/submissions/sub_x1y2z3/flag \
  -H "Authorization: Bearer your_token" \
  -H "Content-Type: application/json" \
  -d '{
    "reason": "duplicate_content",
    "explanation": "This image appears to be from stock photo site XYZ...",
    "evidenceUrls": ["https://stockphoto.com/original-image-123"],
    "originalHash": "a1b2c3..."
  }'

Report Reasons

ReasonUse When
duplicate_contentContent copied from elsewhere
inappropriate_contentRule violations
low_qualityDoesn't meet requirements
wrong_formatMismatched content type
consent_violationIncludes non-consenting parties
copyright_violationStolen/copyrighted content
fraud_suspectedGeneral fraud suspicion
otherOther issues

Whistleblower Rewards

Accurate fraud reports may earn rewards:

Report OutcomeReward
Minor fraud confirmed1 PRIV
Moderate fraud confirmed5 PRIV
Major fraud ring uncovered50+ PRIV
False reportWarning to reporter

Abusing the report system with false or malicious reports will result in penalties.

Security Best Practices

For Contributors

  1. Use your own content - Never submit others' work
  2. Keep originals - Store RAW/source files for proof
  3. Document creation - Screenshots of creation process help
  4. One account only - Multiple accounts will be detected
  5. Honest metadata - Don't fake timestamps or locations

For Bounty Creators

  1. Enable approver voting - Worth the premium for quality
  2. Set appropriate requirements - Clear specs reduce fraud
  3. Monitor submissions - Review samples regularly
  4. Report issues quickly - Faster detection means less loss
  5. Use test bounties - Verify system before large budgets

FAQ

Why was I flagged when my content is original?

False positives happen. Common reasons:

  • Similar content exists elsewhere
  • AI detection isn't perfect
  • Metadata appeared suspicious

Submit an appeal with your original files.

How long does a cooldown last?

PenaltyCooldown
Minor24 hours
Moderate7 days
Severe30 days

Cooldowns start when the penalty is applied, not when you see it.

Can I create a new account after a ban?

Permanent bans include wallet blacklisting. New accounts with the same wallet, IP pattern, or device fingerprint will be detected and banned.

What happens to my pending earnings?

Penalty LevelEarnings Status
Warning/MinorRetained
Moderate+Forfeited

Are false reports penalized?

Intentionally false reports result in warnings, then penalties. Honest mistakes are not penalized.

Next Steps