Whag Solutions

Whag's Network Of Trust

Utilizing a novel, network-based threat detection system, Whag’s community members identify, report, and add suspicious and malicious links to the platform’s Blocklist

an illustration of a whag verified link beeing created, secure url scanner

How It Works:

Utilizing a novel, network-based threat detection system, Whag’s community members identify, report, and add suspicious and malicious links to the platform’s Blocklist in real time. As the network grows, the platform's ability to detect threats scales exponentially.

Icon showcasing the unique 'Whag Tag', a signature feature of Whag for link authenticity

Whag Tags

Every link is tagged with the creator’s unique Whag Tag. Whag Tags are secure representations of the creator’s status as a trusted entity within the network.

Icon representing an approved list or whitelist associated with Whag's services.

Allowlists

Allowlists make it easy to aggregate and share trusted links. Only Verified Links can be added to Whag Allowlists.

Icon depicting a list of blocked or prohibited items, emphasizing Whag's security measures

The Blocklist

Whag maintains an ever evolving Blocklist. If a link is on the Blocklist, it cannot be verified. Any Whag user can add a link to the Blocklist and our proprietary system reviews submissions before approving each addition.