A behavior-based emotional abuse detector that sees what others miss — gaslighting, DARVO, coercive control, escalation cycles.
Reflection tool, not a diagnostic service. No data stored or shared.
Not sure what you're seeing in someone else's relationship? A 3-minute quiz that tells you plainly what you're looking at — and what to do next.
Take the quiz →A training for people who know an abuser — not the victim, the people around him. How to say something, how to sustain it, how to do it even when nothing changes.
Start the training →In abusive dynamics, most conventional interventions either fail or actively cause harm. Knowing what doesn't work is as important as knowing what does.
The Archive hosts published reports based on communication pattern analysis submitted by individuals who affirm they are the recipient of the provided messages. Reports are generated using Tether Pro and published only when abuse patterns meet strict thresholds.
Individuals are named publicly only when all of the following conditions are met:
These reports are not criminal accusations. They are behavior-based documentation meant to surface communication patterns that align with known abuse dynamics: DARVO, coercive control, emotional invalidation.
Any individual named in a published report may request a review by contacting usetetherai@gmail.com. All review requests are taken seriously. Removal is not guaranteed unless evidence shows the original submission was fraudulent or did not meet publishing criteria.
If you are in immediate danger, call 911. If you are not in immediate danger but need support, these resources are confidential and available now.
Tether is built on Applied Behavioral Linguistics — an approach that decodes the function of language, not just the words. It reveals patterns like gaslighting, blame-shifting, and coercive warmth by asking: what is this message trying to do?
Tether analyzes tone, behavioral function, emotional manipulation, and risk across written messages. It identifies patterns including DARVO cycles, escalation clusters, boundary violation frequency, and manipulation tactic density.
Unlike tools that look for keywords, Tether looks at behavioral function — the purpose a message is serving, not just its content. "I just worry about you" can be care or surveillance. Context and pattern determine which.
Training data included real messages from known abuse cases, used with consent and including the creator's own experience. It was built from the inside out.
Tether does not store, save, or transmit any messages. All analysis runs locally in your browser or through Hugging Face's secure API. No identifying information is ever collected, stored, or shared.
Your data never leaves your screen.
Tether is a reflection tool, not a diagnostic service. It is not a substitute for professional support — but it can help you see what you're dealing with clearly enough to know what kind of support to seek.
Questions: usetetherai@gmail.com
Tether is free and will stay free. If it helped you, a donation keeps it running and supports continued development — including Tether Pro for professionals working in DV, custody, and forensic settings.
Donate to Tether ❤