Our multi-level approach to source data comes from a combination of manual searches by our experienced white hackers, advanced automated machine searches and a collaborative effort together with our partners where we aggregate data from. This is an ongoing, ever evolving process, combining our own and our vendors’ data so we can provide coverage like no one else.
In case of a new breach, all information is cross-referenced with the entirety of our collected data. We immediately check your personally identifiable information against all available data and alert you if any of your information is at risk.
We recognise the trust placed in us and take great responsibility in our mission. We have strong moral beliefs when it comes to safeguarding our users. We never abuse personal data or reveal any of our sources to people outside of affected users or the IT security community. We never pay anyone selling personal data.
However, in some cases, we will have to pay for invites and access/credits to markets.