Privacy Protocol
Last Updated: January 2026
1. Data Collection
TraceBack Intelligence operates on a "Zero-Knowledge" architecture where possible. However, to provide our services, we process the following:
- Search Queries: Usernames entered into the scanner are processed in real-time but are not permanently stored in our public logs.
- Access Logs: We collect IP addresses and browser user-agents for security auditing and DDoS protection.
2. Third-Party Services
Our infrastructure utilizes trusted third-party vendors.
3. Data Usage
We do not sell, trade, or rent your personal identification information to others. Data is used strictly to:
- Execute the requested OSINT scans.
- Improve the accuracy of our search nodes.
4. Contact
For privacy-related inquiries, contact the Data Controller at privacy@traceback.tech.