Security overview

Built like an adversary. Locked like a vault.

LeakSource was designed from day one as a security-first operation. Every workflow, tool, and environment we use to hunt fraud and leaks is hardened so your data stays protected while we go to war for your revenue.

Zero-trust principles Encrypted end-to-end Segregated environments

Core security principles

Everything we do sits on three non-negotiables:

  • Minimize data: we only ingest what we need to prove or disprove abuse.
  • Harden access: we strictly control who and what can touch your data.
  • Prove integrity: evidence and findings are cryptographically anchored.
Access control

Least-privilege access for every account. Multi-factor enforced. No shared logins. Access windows are time-boxed to each engagement.

Encryption

In-transit encryption with modern TLS. At-rest encryption on all storage. Strong key management with strict rotation policies.

Isolation

Client data is logically segregated. Investigation environments are isolated so one client’s evidence never touches another’s.

Operational security during an engagement

1. Secure intake
We agree on the minimum data we need, sign scope & NDAs, and set up a hardened secure channel for transfers.
2. Controlled analysis
Data is pulled into an isolated workspace with strict role-based access. All activity is logged and monitored for anomalies.
3. Evidence hardening
Critical evidence is hashed and time-stamped so you can use it internally or in legal / HR processes with confidence.
4. Secure handoff & purge
Final reports are delivered over secure channels. At the end of the retention window, your data is systematically destroyed.