×
SCANNER ACCESS LABS MISSION

Privacy Protocol

Last Updated: January 2026

1. Data Collection

TraceBack Intelligence operates on a "Zero-Knowledge" architecture where possible. However, to provide our services, we process the following:

  • Search Queries: Usernames entered into the scanner are processed in real-time but are not permanently stored in our public logs.
  • Access Logs: We collect IP addresses and browser user-agents for security auditing and DDoS protection.

2. Third-Party Services

Our infrastructure utilizes trusted third-party vendors.

3. Data Usage

We do not sell, trade, or rent your personal identification information to others. Data is used strictly to:

  • Execute the requested OSINT scans.
  • Improve the accuracy of our search nodes.

4. Contact

For privacy-related inquiries, contact the Data Controller at privacy@traceback.tech.