Cookie choices

OopsBusted uses essential cookies for the product flow and optional analytics and preference storage for attribution, convenience, and UX continuity. Choose how much you want to enable.

Ethics & Safety

Consent, privacy, and partner surveillance ethics for dating-app verification

OopsBusted exists to provide clarity, not covert surveillance. This document explains the consent and privacy boundary, the ethics of partner-monitoring queries, and the safety limits of the service.

Framework

Operational commitments

OopsBusted operates within a strict ethical framework to ensure that our tools are used for clarity, not harm.

Zero Tolerance for Harassment

OopsBusted is for personal relationship verification. We do not support or tolerate the use of our tools for stalking or illegal harassment.

No Real-Time Tracking

Our technology is built for platform presence verification, not continuous real-time tracking, spyware behavior, or covert surveillance.

Asset Sovereignty

Users retain rights to their submitted content; we only use images for the duration of the matching workflow.

Permitted

Approved use cases

These scenarios represent the core intent of our services.

  • Verifying exclusivity in a committed relationship
  • Validating profile activity after a breakup
  • Confirming consistency in online dating behavior

Prohibited

Zero-tolerance misuse

OopsBusted actively blocks and reports misuse in these categories.

  • Targeting public figures for non-personal reasons
  • Using results to facilitate physical stalking
  • Attempting to bypass legal restraining orders
Governance

Complete the trust profile

Ethics and Security go hand-in-hand. Explore our technical safeguards, the legal boundary around partner monitoring, and the privacy-first workflow behind the product.

Legalities of Monitoring a Partner Online

Read the direct legal and ethical boundary between private verification and covert surveillance.

Read legal guide

Privacy Risks on Dating Apps

See why privacy, proportionality, and platform exposure matter before any trust-check becomes invasive.

Read privacy guide

Start Private Search

Move into the live intake once the route, trust threshold, and evidence standard are clear enough to act.

Start search

Pricing

Compare one-time app checks, broader bundles, and proof-related add-ons before checkout.

Compare pricing

Compare Alternatives

Use the comparison hub when the buyer still needs route-choice or competitor context before purchasing.

Open compare

Sample Proof Package

Preview screenshots, confidence notes, and no-match handling before money changes hands.

View proof

Before You Buy

Resolve the last objections around scam risk, recurring billing, no-match outcomes, accuracy, and data removal before checkout.

Open objection hub

Verification Hub

Narrow catfish, romance-scam, AI-image, and before-confrontation questions into the right proof route.

Open verification hub

Transparency Report

See representative monthly search volume and the safeguards that prevent the target from being alerted.

Read report

Security Protocol

Examine the technical safeguards, encryption standards, and data residency protocols.

Review security

Privacy Controls

Review retention windows, deletion boundaries, and the public request path in one control hub.

Open privacy controls