B2C — Data Protection & Linux
Personal Privacy Audit
A structured audit of your digital footprint — accounts, email, phone, browser — with a written report and a prioritized action plan.
We walk through your digital attack surface systematically and deliver a written report with concrete, prioritized actions. Not a generic checklist PDF — the recommendations are sized to your actual situation.
What’s included
- 60-minute threat-modeling conversation: who might target you, what you’re protecting and why, what’s acceptable to expose
- Audit of your key accounts (email, cloud, social, banking) for breached credentials, weak passwords, missing 2FA
- Phone check: app permissions, location data, metadata in backups
- Browser and DNS profile: trackers, fingerprinting, unintended data flows
- Written report (10–15 pages) with three priority tiers: today, this week, this quarter
- Optional: a 30-minute follow-up call to walk through the top three actions
Who it’s for
Individuals who want a clear picture and an actionable plan — journalists, lawyers, activists, or anyone with a heightened awareness of digital hygiene. We work under NDA; all notes are destroyed after the engagement closes.
What’s not included
We don’t do forensics on already-compromised devices — that’s a different engagement. For active stalking or domestic abuse situations, we refer to specialized support organisations and name them in the report.