Transparency Report
A representative look at search volume, privacy safeguards, and what we never do
This report is designed to answer the trust questions directly: how much search activity the platform handles, how the workflow protects user privacy, and why the target is not alerted during the process.
1,000+
monthly search intakes
Representative monthly volume across focused platform searches, broader bundles, and follow-up investigation requests.
0
target alerts
The workflow is built so the target is not notified as part of the search or proof-delivery process.
No account
linking required
Users are not asked to connect the target’s dating profiles or log into accounts to begin the route.
Reporting note
How to read these numbers
Figures below are rounded, representative operational snapshots. They are published to communicate scale and privacy posture without exposing user-specific or target-specific information.
Commitments
What we commit to operationally
These are the policy commitments that matter most to users deciding whether the workflow is legitimate and private.
We do not alert the target
Searches are designed to remain private-first. The workflow does not send messages, notifications, or visible signals to the person being searched.
We keep required input narrow
The process prioritizes only the details that improve matching quality instead of asking for unnecessary account access or invasive data collection.
We deliver proof privately
Results are packaged for the requester, not broadcast publicly, and are structured around screenshots and reviewable context.
We round reporting figures on purpose
Operational counts are shared at a representative level so the company can be transparent about scale without exposing sensitive usage patterns.
Process
How searches are handled from intake to proof
The search process is designed to protect the requester while avoiding target notification throughout the workflow.
Stage 1
Private intake
The search starts with the smallest set of useful inputs: usually a recent image and the most relevant platform clues.
Stage 2
Platform-aware matching
The workflow stays narrow or broad depending on the suspicion pattern, which helps reduce unnecessary noise.
Stage 3
Evidence review
Likely matches are returned with screenshots and supporting context so the user can evaluate them privately.
Stage 4
No target notification
At no point is the target contacted, pinged, or otherwise alerted by the OopsBusted workflow itself.
Next step
Use transparency as a filter, then move into the product
If the privacy safeguards and operating posture match what you needed to verify, move next into the live search intake.
FAQ
Questions about privacy and reporting
These are the trust questions that matter most when users are deciding whether the workflow is legitimate.
01Do you alert the target when a search is run?
No. The workflow is built specifically to avoid notifying the target as part of the search, review, or proof-delivery process.
02Are the monthly search figures exact?
They are rounded representative figures. The goal is to be transparent about scale without exposing sensitive operational detail or customer-specific patterns.
03Do users need to link accounts before starting?
No. The route stays private-first and does not require linking the target’s accounts or logging into dating platforms before intake.
Trust cluster
Use the transparency report to validate the workflow, then keep moving
These pages work together to answer the biggest objections: how the technology works, whether real users find proof, and how privacy is handled.
AI Photo Matching
See how the matching workflow works, what affects accuracy, and why it beats manual searching.
See AI matchingSuccess Stories
Review anonymized case studies that show how users move from suspicion into proof.
Read storiesSecurity Protocol
Examine the technical safeguards, encryption standards, and data residency protocols.
Review securityEthics & Safety
Understand our operational boundaries and zero-tolerance policy for harassment.
Read ethicsSample Proof Package
See a reconstructed example of the final PDF report delivered to users.
View samplesStart Search
Move directly into the intake flow when you already have the strongest photo and platform clue ready.
Start search