Skip to content
Mainframe

B2C — Data Protection & Linux

Personal Privacy Audit

A structured audit of your digital footprint — accounts, email, phone, browser — with a written report and a prioritized action plan.

We walk through your digital attack surface systematically and deliver a written report with concrete, prioritized actions. Not a generic checklist PDF — the recommendations are sized to your actual situation.

What’s included

  • 60-minute threat-modeling conversation: who might target you, what you’re protecting and why, what’s acceptable to expose
  • Audit of your key accounts (email, cloud, social, banking) for breached credentials, weak passwords, missing 2FA
  • Phone check: app permissions, location data, metadata in backups
  • Browser and DNS profile: trackers, fingerprinting, unintended data flows
  • Written report (10–15 pages) with three priority tiers: today, this week, this quarter
  • Optional: a 30-minute follow-up call to walk through the top three actions

Who it’s for

Individuals who want a clear picture and an actionable plan — journalists, lawyers, activists, or anyone with a heightened awareness of digital hygiene. We work under NDA; all notes are destroyed after the engagement closes.

What’s not included

We don’t do forensics on already-compromised devices — that’s a different engagement. For active stalking or domestic abuse situations, we refer to specialized support organisations and name them in the report.