We deeply believe in stuff others don’t.
You always know how it works.
You always know where the data comes from.
You also know when there is nothing to worry about.
Spotted leaked data is not prospection material.
Spotted leaked data is not key to more data leaks.
Spotted leaked data is not a way to show off.
We won’t breach other systems to collect data.
We won’t collect data from systems that are not open by intent.
We won’t harm other systems by collecting data.
There is no magic.
Buzz words do not detect data leaks.
Algorithms and technical expertise do.
Always report when we find something jeopardizing the security of an entity.