Security Protocol

Tactical data safety and privacy engineering

This page details how OopsBusted handles sensitive investigation data. We treat every search as a high-stakes operation where data security is non-negotiable.

AES-256

encryption

All data is encrypted at rest and in transit using military-grade standards.

Limited

retention

Personalized search data is archived or purged after the reporting window closes.

Stripe

payments

OopsBusted never stores your credit card details; all billing is handled by Stripe.

Safeguards

Defense-in-depth protocols

Our security architecture is designed to protect both the requester and the integrity of the search result.

Transport Layer Security (TLS)

Every connection to our intake servers is secured via TLS 1.3, preventing interception of your search inputs.

Data Sovereignty

Search results are delivered through private, obfuscated URLs that are accessible only to the requester.

PII Sanitization

We minimize the collection of Personally Identifiable Information (PII) to only what is required for matching.

Infrastructure Isolation

Matching algorithms run in isolated environments to prevent cross-contamination of search data.

Transparency

Data handling disclosures

OopsBusted operates with a focus on data sanitization and non-persistence.

  • We do not sell user data to third-party marketing lists.
  • Search history is private and not indexable by public search engines.
  • Access to internal search logs is restricted to authorized investigative personnel only.

Governance

Complete the trust profile

Security is only one layer of the OopsBusted trust model. Explore our ethical boundaries and representative success metrics.

AI Photo Matching

See how the matching workflow works, what affects accuracy, and why it beats manual searching.

See AI matching

Success Stories

Review anonymized case studies that show how users move from suspicion into proof.

Read stories

Transparency Report

See representative monthly search volume and the safeguards that prevent the target from being alerted.

Read report

Ethics & Safety

Understand our operational boundaries and zero-tolerance policy for harassment.

Read ethics

Sample Proof Package

See a reconstructed example of the final PDF report delivered to users.

View samples