Security: no-password policy
We never ask for your password. Our workflow is based on official platform processes and secure evidence collection—designed to protect your access boundaries.
What we may ask for
- • Account URL / username
- • Proof-of-ownership signals (screenshots, emails, device confirmations)
- • Timeline of incident and suspicious activity indicators
- • Prior ticket IDs / reference numbers (if available)
What we will never ask for
- • Your password
- • Your 2FA / MFA codes
- • Session cookies / token exports
- • Remote access to your device
Scope boundaries
- • We guide official recovery / reporting flows and package evidence.
- • We do not “hack accounts” or bypass platform security.
- • If a platform denies a request, we document next steps and options.
Audit trail & evidence handling
- • Every submission has a log: what was sent, when, and via which channel.
- • Evidence is stored only as needed for the case and can be deleted on request.
- • We minimize data collection: only what supports ownership and recovery.
Looking for delivery details? See Services.
Start safely
Use the case review flow to submit details securely. We’ll respond with scope + next steps.