Educational · Public sources only

Keep your personal details off the public web

We find the areas that list your address, phones, emails, and other sensitive details and give you a direct, step-by-step plan to reduce them. No outreach from us. You stay in control.

Schedule now How it works
$349
Flat price
2–4 days
Standard delivery
Full findings
Links & timestamps

What you receive

Short, clear report with full links

  • Executive summary you can skim in a minute
  • Risk labels (High / Medium / Low)
  • Every item with source link, timestamp, and screenshot where useful
  • DIY steps with direct links—no filings by our team
  • A short phone call to review and prioritize

Not for employment or tenant screening.

Why clients choose this

Why you want it

  • Keep your home address, phones, and personal emails off public listings you don’t control.
  • Cut down on cold calls, spam, and impersonations that start with public data.
  • Be ready before press, a funding round, a lawsuit, or a high profile purchase closes.
  • Reduce family exposure without deleting real accounts or going off the grid.
  • Have a clean, timestamped record of what’s public—useful for counsel or your family office.

What we do

  • Find the obvious places your details appear online.
  • Show the exact pages with links and screenshots.
  • Rank each item by risk and tell you what to do first.
  • Give direct links so you can fix or reduce exposure yourself.
  • Deliver a short, clear report in 2–4 business days.

How it works

1. Book

Choose a time and pay to reserve the slot.

2. Verify

Identity check and a short e-sign consent.

3. Collect

We search public sources and log evidence with timestamps.

4. Deliver

You receive a full detailed report and a short read-out call.

Boundaries

  • Public information only. No restricted or sensitive access information
  • No outreach to platforms. No opt-outs performed
  • No paywalled scraping. No pretexting
  • Reports are deleted immediately after delivery

Collection scope

Identity & name variants

Legal name, common aliases, prior names as publicly posted (directories, bios, filings).

Contact surface

Publicly listed emails and phone numbers appearing on sites, directories, signatures, or cached pages.

Username & handle reuse

Cross-platform reuse of unique handles that link accounts across forums and apps.

Data-broker profiles

Aggregators and people-search sites that publish compiled profiles and contact history.

Address history (compiled)

Addresses listed by brokers or directories; no offline canvassing or imagery.

Property ownership & transfers

Public assessor/recorder portals and MLS archives visible online for deeds and listings.

Corporate & entity interests

Secretary of State and similar registries for LLCs, corporations, and officers/managers.

Professional & executive listings

Company sites, board/committee rosters, conference bios, speaker pages.

Licenses & certifications

Public registries (e.g., bar, medical, real estate, PE) that confirm identity and location.

Donations & political contributions

Public campaign-finance portals and published donor lists.

Philanthropy & nonprofit records

Public 990/charity disclosures and nonprofit leadership listings available online.

Litigation & court dockets

Publicly accessible state/federal docket portals and published orders (no paywalled access).

News & media mentions

Press releases, interviews, profiles, and public articles that include personal details.

Events & guest lists

Published conference agendas, charity galas, and attendee/speaker lists.

Alumni & memberships

Public alumni directories, honor rolls, club rosters, league/association pages.

Social profiles & public posts

Official accounts, open posts, groups, follows, and visible family/work links.

Impersonation & brand abuse

Look-alike social accounts, fake listings, and pages using your name or likeness.

Marketplace & seller pages

Public profiles on marketplaces (e.g., e-commerce, classifieds) tied by handle or name.

Domains & WHOIS

Registered domains, historical WHOIS where public, name servers, MX, and contact roles.

Certificate Transparency

Public TLS/CT logs that reveal domains and subdomains issued certificates.

Public DNS footprint

Openly resolvable records (A, AAAA, MX, TXT) and obvious subdomains from public sources.

Web trackers & IDs

Public analytics/ads IDs (e.g., GA, Pixel) that link properties under your control.

Public code & developer profiles

GitHub/GitLab and package registries that expose emails, keys, or project ties.

Email avatar & profile leaks

Public avatar/services (e.g., Gravatar) that reveal images or names from email hashes.

Breach & paste exposure

Public breach indexes and paste sites referencing your emails/usernames (lookup via permitted accessonly).

Reverse phone presence

Public reverse-lookup sites, classifieds, signatures, or posts that list phone numbers.

Reverse image search

Public images that match your portraits or headshots; EXIF only if shown online.

Transportation registries

FAA tail numbers and marine MMSI/registry entries that are publicly searchable.

Business & map listings

Public business profiles on map and review platforms that show addresses or phones.

Archive & cache

Wayback/archival copies of pages that expose data removed elsewhere.

Regulatory disclosures

Public SEC/FINRA and similar disclosures (ownership forms, advisor listings) when applicable.

Why it matters

Each category is distinct to avoid overlap. Findings are ranked by harm, exposure, and exploitability.

Deliverables

Executive summary

A clear summary on all findings that might pose a risk to your security

Risk map

High, Medium, Low labels that match the findings list.

Full findings

Source, link, screenshot if needed, timestamp, why it matters, and DIY steps for each item.

Phone call

Detailed phone call to review the report and prioritize actions.

Fix plan you can act on

  • Direct links to removal or update pages
  • Short instructions that save time
  • No filings by our team. You keep control

If you later want a follow-up check or filing help, ask for options.

Case study

Brothers Charged in $8 Million Armed Crypto-Kidnapping Heist

“As alleged in the complaint, the Garcia brothers terrorized a Minnesota family in their own home, kidnapping one family member while holding the rest of the family hostage in order to conduct a brazen cryptocurrency theft”

Relevant Case:
  • Headline: Brothers Charged in $8 Million Armed Crypto-Kidnapping Heist
  • Source: Justice.Gov · Date: Sep 25th 2025
  • What happened: During the robbery, Victim 1 saw both Garcia brothers frequently making phone calls to an unknown third party, who appeared to be providing the information related to the cryptocurrency accounts and transfers. Through this third party, the Garcia brothers became aware that Victim 1 had additional cryptocurrency funds. They demanded the money.
  • Why it matters: Public data can tie your name, emails, and handles to wallets, exchanges, and past transactions. In a coercive situation, those details make claims about “other accounts” sound credible and point directly to what to demand. Reducing these public links lowers both the likelihood and the leverage of this kind of abuse.

Takeaways for clients

  • Public records and profiles can be chained together to reveal home, family, and routine.
  • Old pages and archives keep data live even after you change a site.
  • Clear, linked steps let you reduce exposure quickly without handing over accounts.

This is educational commentary on public reporting. We do not provide identity protection or ongoing monitoring services.

Pricing

Single product

Executive Exposure Report

$349

Delivery in 2 to 4 business days

  • Public sources only, information that anybody can find
  • Full list of findings with links and timestamps
  • Screenshots for key items
  • DIY steps with direct links
Schedule now
Optional

Rush add-on

+$99

Delivery in 24 to 48 hours if the calendar allows

Booked per availability. Contact via email before selecting this option.

FAQ

Do you remove my info?

No. We identify it and give you the links and steps to remove or reduce it yourself.

Do you investigate other people?

Absolutely not. Only the verified client booking the service can order a report.

Is this legal?

Yes. We use public sources and follow site terms. No bypass or protected information.

Is this a background check?

No. It is not for employment or tenant screening. We are not a consumer reporting agency and do not conduct Identity Monitoring/Protection services.

What do you keep and for how long?

We keep the report and work files for development only. We then purge everything once delivery is complete.

How private is this?

Engagements are confidential under the terms. We can work through a family office if you prefer.

Schedule a consult

Step 1

Pick a time that works. We send identity verification and a short consent right after you book.

We'll follow up within 8 hours with an intake form and ID Verification.

Step 2

When the consent is signed you receive a short intake form. Work starts after payment posts.

If you need an invoice or prefer wire or ACH, please send us an email.

Executive Exposure Report Public sources only
$349
Schedule