← Back to Home

Is what you do legal?

Yes. We only collect publicly accessible information using passive reconnaissance techniques. We never attempt unauthorized access, exploit vulnerabilities, or conduct any form of hacking. All our methods are the same used by security researchers, journalists, and academics worldwide.

How do you protect journalists and activists?

Upon request from digital rights organizations or the individuals themselves, we scrub journalist and activist data from our datasets within 24 hours. We prioritize protection of vulnerable individuals over publication.

Do you practice responsible disclosure?

For critical vulnerabilities that pose immediate risk to individuals, we attempt to notify affected parties before publication. However, for authoritarian regimes that may use this information to harm citizens, we prioritize public disclosure and documentation.

Can I request data for my investigation?

Yes. Journalists, researchers, and human rights organizations can request access to our datasets. Contact us via encrypted channels with details about your investigation and how the data will be used.

How can I support your work?

You can support us through direct donations, grants, or by spreading awareness of our research. We're also always looking for skilled volunteers in OSINT, development, and analysis.

Why focus on authoritarian regimes?

Digital vulnerabilities in authoritarian governments often expose surveillance infrastructure, censorship mechanisms, and human rights abuses. Documenting these serves democratic accountability and supports civil society organizations working on the ground.