Security Protocol
Tactical data safety and privacy engineering
This page details how OopsBusted handles sensitive investigation data. We treat every search as a high-stakes operation where data security is non-negotiable.
AES-256
encryption
All data is encrypted at rest and in transit using military-grade standards.
Limited
retention
Personalized search data is archived or purged after the reporting window closes.
Stripe
payments
OopsBusted never stores your credit card details; all billing is handled by Stripe.
Safeguards
Defense-in-depth protocols
Our security architecture is designed to protect both the requester and the integrity of the search result.
Transport Layer Security (TLS)
Every connection to our intake servers is secured via TLS 1.3, preventing interception of your search inputs.
Data Sovereignty
Search results are delivered through private, obfuscated URLs that are accessible only to the requester.
PII Sanitization
We minimize the collection of Personally Identifiable Information (PII) to only what is required for matching.
Infrastructure Isolation
Matching algorithms run in isolated environments to prevent cross-contamination of search data.
Transparency
Data handling disclosures
OopsBusted operates with a focus on data sanitization and non-persistence.
- We do not sell user data to third-party marketing lists.
- Search history is private and not indexable by public search engines.
- Access to internal search logs is restricted to authorized investigative personnel only.
Governance
Complete the trust profile
Security is only one layer of the OopsBusted trust model. Explore our ethical boundaries and representative success metrics.
AI Photo Matching
See how the matching workflow works, what affects accuracy, and why it beats manual searching.
See AI matchingSuccess Stories
Review anonymized case studies that show how users move from suspicion into proof.
Read storiesTransparency Report
See representative monthly search volume and the safeguards that prevent the target from being alerted.
Read reportEthics & Safety
Understand our operational boundaries and zero-tolerance policy for harassment.
Read ethicsSample Proof Package
See a reconstructed example of the final PDF report delivered to users.
View samples