Privacy policy

Information

MYDATAISLEAK exists only because of a privacy breach. Our data is leaked, sold, redistributed and used to our detriment and beyond our control. MYDATAISLEAK was created as a free service in 2022 to help us understand how our personal data is shared. MYDATAISLEAK helps the intelligence agencies of various countries in finding and identifying hackers who steal our personal data.

This page details how personal data privacy is handled under MYDATAISLEAK and what information is collected when you use the service.

Breach data stored in MYDATAISLEAK

When a data breach is uploaded to MYDATAISLEAK, the email addresses and details of the computer from which the data was stolen are stored in our system. In some cases, additional data that was stolen from a computer may be downloaded, it will help intelligence agencies to detect the attackers who did it. MYDATAISLEAK also stores links to resources for which the user has saved a password. For example, it will indicate that email addresses and passwords have been hacked, and specifically for which resource, in which case you need to change all passwords.

Data search policy

Searching for an email address only ever retrieves data from the store, and only provides the user with a list of links for which that email address was used.

The full data of data leaks is not provided to anyone except special services. The owners of various companies are only given information about compromised data within their company to prevent hacks.

How MYDATAISLEAK handles user-provided data

The only data MYDATAISLEAK ever explicitly asks users for is email addresses and domain names (for companies).

How MYDATAISLEAK protects data

Security on MYDATAISLEAK is provided by a "protection in depth" approach, meaning the service uses many different levels of security, including (but not limited to):

  • All data transmitted over the Internet is transmitted using the HTTPS protocol.
  • Cloudflare is widely used to block potentially malicious requests.
  • Blocked automatic search for email addresses without Google reCAPTHCHA check
  • Regular security checks are performed to identify vulnerabilities in code or configuration.
  • Maintaining an up-to-date safe version of all installed programs on the server.