Security: no-password policy

We never ask for your password. Our workflow is based on official platform processes and secure evidence collection—designed to protect your access boundaries.

What we may ask for

  • • Account URL / username
  • • Proof-of-ownership signals (screenshots, emails, device confirmations)
  • • Timeline of incident and suspicious activity indicators
  • • Prior ticket IDs / reference numbers (if available)

What we will never ask for

  • • Your password
  • • Your 2FA / MFA codes
  • • Session cookies / token exports
  • • Remote access to your device

Scope boundaries

  • • We guide official recovery / reporting flows and package evidence.
  • • We do not “hack accounts” or bypass platform security.
  • • If a platform denies a request, we document next steps and options.

Audit trail & evidence handling

  • • Every submission has a log: what was sent, when, and via which channel.
  • • Evidence is stored only as needed for the case and can be deleted on request.
  • • We minimize data collection: only what supports ownership and recovery.
Looking for delivery details? See Services.

Start safely

Use the case review flow to submit details securely. We’ll respond with scope + next steps.