Built like an adversary. Locked like a vault.
LeakSource was designed from day one as a security-first operation. Every workflow, tool, and environment we use to hunt fraud and leaks is hardened so your data stays protected while we go to war for your revenue.
Core security principles
Everything we do sits on three non-negotiables:
- Minimize data: we only ingest what we need to prove or disprove abuse.
- Harden access: we strictly control who and what can touch your data.
- Prove integrity: evidence and findings are cryptographically anchored.
Least-privilege access for every account. Multi-factor enforced. No shared logins. Access windows are time-boxed to each engagement.
In-transit encryption with modern TLS. At-rest encryption on all storage. Strong key management with strict rotation policies.
Client data is logically segregated. Investigation environments are isolated so one client’s evidence never touches another’s.