What a digital footprint audit is

Most people have never seen what their own digital footprint actually looks like. They assume it is a few social profiles, an old professional bio, maybe a photo from a work event. It is almost always larger than that.

A digital footprint audit is the professional version of the question "what can be found about me?" — run by a human analyst instead of an automated scanner. It produces a written record of what a determined person would surface in a concentrated investigation: data broker listings, breach-tied credentials, dark web references, passive OSINT traces, and the connections between them.

Free checkers tell you what crawlers can find in 60 seconds. A professional audit tells you what a trained investigator would find in a structured 48-hour sweep. The difference between those two answers is the entire reason this page exists. If you want a lightweight starting point before committing, the Privacy Risk Score is a 2-minute quiz that gives you a rough exposure rating.

What a professional audit finds

A PI Solutions audit covers four exposure categories. Each one produces documented findings you can act on.

1. Data broker listings

People-search sites, US and EU data brokers, background check aggregators, and EU-specific consumer data platforms. We identify which platforms carry your record, what fields they expose (address history, phone numbers, relatives, employers), and which opt-out paths work in practice.

Example: a typical audit on a Netherlands-based executive surfaces 40–90 broker listings across US and EU platforms.

2. Credential and dark web exposure

Breach-tied email addresses, password hashes traceable to your accounts, combo lists circulating on credential markets, and identifiers surfacing in paste sites. We verify findings against multiple sources — a single hit on a free breach checker is not an audit.

3. Passive OSINT profile

What an analyst constructs from connecting public traces: domain registrations, archived profiles, metadata from photos and documents, social graph inferences, professional history, family and household connections. This is the category that surprises people — not because any single item is secret, but because the combined picture is.

4. Breach and incident records

Specific breach events tied to your identifiers — with dates, sources, and what data was exposed. Documented per source, not summarised as a vague count.

For a worked example of how these findings appear in the final report, see a sample audit report.

Free checkers vs. a professional audit

Both exist. They do different things.

Free checker Professional audit
Time to deliver60 seconds48 hours (The Mirror)
SourceCrawled databasesHuman analyst + crawlers
DepthSurface matchesConnection analysis
Data brokers checked5–30150+
Dark web verificationSingle sourceCross-verified
Passive OSINTNoneFull profile
Written reportNoStructured PDF
CostFreePaid service

The Mirror is PI Solutions' standardised digital footprint audit — 48-hour delivery, no scoping call required. The Eraser and The Shield include the Mirror audit as their foundation; those tiers have longer engagement windows because they add removal and threat-assessment work after the audit.

If you only want a quick indicator, a free checker is fine. If you need to act on what is found — because of an incoming threat, a role change, litigation, or a protective order — you need the version with an analyst and a written record.

Our free entry point is the Snapshot Scan: a lightweight professional preview that surfaces the highest-severity findings in your first category. It is not the full audit, but it is honest about what is and is not covered.

Who needs a digital footprint audit

Four situations account for most of the audits we run.

Executives and public-facing professionals. Board members, C-suite, partners, anyone whose home address or family details appearing in public creates personal risk. Companies often cover executive digital protection under their security budget — see For Executives.

High-net-worth individuals. Wealth-related targeting is specific and often quiet. A professional audit establishes what a social engineer or investigator could build before attempting to contact you or your household.

Legal and financial professionals. Lawyers handling contested matters, fund managers, compliance officers. Exposure that is merely awkward for others is professional liability for you.

Before a known change in exposure. A divorce or custody matter, a restraining order, a planned public role, a move. An audit run in advance gives you a baseline and a removal plan; an audit run after is a damage assessment. The first is much cheaper.

If your concern is about your organisation rather than you personally, the Corporate Audit covers staff exposure, vendor risk, and supply chain OSINT.

How PI Solutions runs an audit

The Mirror is our standardised digital footprint audit — no mandatory discovery call, no custom-scoping overhead. You request it, we run it, you get the report in 48 hours.

1

Request

Start with a free Snapshot Scan for a lightweight preview, or order The Mirror directly. Orders are capped each week so every audit is run by a human analyst, not a queue bot.

2

Investigation

An analyst runs the four-category sweep — data brokers, credential and dark web exposure, passive OSINT, breach records — across professional sources. Findings are logged as they are confirmed.

3

Verification

No finding enters the final report without cross-verification. A single hit on a free checker is never a conclusion — every documented result is sourced and reviewable.

4

Delivery

You receive a structured PDF report with per-category risk scoring and a prioritised remediation plan within 48 hours of ordering. All collected data is cryptographically purged within 48 hours of delivery, per our Data Purge Policy.

For executives facing an active threat or a complex situation — stalking, targeted social engineering, pattern-of-life concerns — The Shield is scoped individually on intake and includes a 60-minute analyst consultation. See our full Methodology for the process documentation.

Pricing and entry points

PI Solutions offers three entry points to a digital footprint audit, each with a clear upgrade path.

Snapshot Scan Free

A lightweight professional preview. Start at free-scan. One-page PDF delivered within 48 hours. Limited slots per week.

The Mirror €595

The full audit described on this page. Covers all four exposure categories, structured PDF report, prioritised remediation plan. Delivered within 48 hours. Fee credit: if you proceed to The Eraser within 30 days, the €595 is credited in full. See The Mirror.

The Eraser €3,800

The Mirror audit plus active removal across 150+ broker and people-search platforms. This is the right starting point if you already know exposure is high and want the audit and removal combined. Family Member Extension available at €750 per additional person. See The Eraser.

For ongoing monitoring after a completed audit and removal cycle, The Guardian is a €2,400/year retainer offered to every completed Shield or Eraser client.

Frequently asked questions

What is a digital footprint audit?

A professional review of what is publicly findable about you — data broker listings, breach-tied credentials, dark web references, and passive OSINT — performed by a human analyst and delivered as a written, actionable report. It is the paid, evidence-backed version of the question "what can someone find out about me?" — delivered by PI Solutions within 48 hours.

What gets checked in a digital footprint audit?

Four exposure categories: data broker and people-search listings across US and EU platforms, credential and dark web exposure, passive OSINT (metadata, social graph, archived content, document traces), and breach-tied records. Each finding is documented with source, severity, and a recommended action.

How can I check my own digital footprint?

You can start with free tools like HaveIBeenPwned for credential exposure and search yourself with quoted phrases on major search engines. Those cover surface matches. For anything beyond "am I in a breach?", you need a method that includes data broker platforms, dark web sources, and analyst review — which is what a professional audit provides.

Am I on the dark web?

If you have ever had an email address in a service that was later breached, some form of your data almost certainly is. The question is not whether — it is which identifiers, paired with what, and whether they are in active trading sets. A professional audit answers that specifically. If credential exposure is your primary concern, see The Lockdown.

Can you completely wipe a digital footprint?

No — honestly, nobody can, and anyone claiming to is misleading you. You can materially reduce it: a full professional audit followed by removal work typically eliminates 80–95% of commercially indexed exposure and documents what remains. Archived content, court records, and press coverage generally cannot be removed on request. The Eraser is the service built for maximum feasible reduction.

How much does a digital footprint audit cost?

PI Solutions offers three entry points: a free Snapshot Scan (lightweight preview, 1-page PDF in 48 hours), The Mirror at €595 (full audit with structured PDF report in 48 hours), and The Eraser at €3,800 (audit plus removal). The €595 Mirror fee is credited in full toward The Eraser if you proceed within 30 days.

See what a determined person could actually find

Start with a free Snapshot Scan. It is honest about what it covers, delivered in 48 hours, and run by the same analyst team that handles the full audit.

Request a Snapshot Scan Or order The Mirror directly — €595, structured PDF report within 48 hours.