Five services covering digital exposure, credential security, threat mitigation, and data removal — for individuals, executives, and organisations. All pricing is fixed and published. Not sure where to start? Request a free Snapshot Scan first — see below.
150+
Data brokers removed per engagement
48hr
Audit delivery guarantee
300+
Platforms checked per audit
100%
Discretion — no public client list
Start with a free Snapshot Scan — no commitment, no fee. Use our contact form to request a Snapshot Scan. We’ll check your exposure across public sources, breach databases, and data brokers. You receive a 1-page summary within 48 hours. We accept a limited number of requests each week. An alias is accepted for initial contact.
The Snapshot Scan result will indicate which service — if any — is right for your situation.
For you if: you want to know what’s publicly findable about you — breach records, data brokers, username traces, social profiles.
A human-led open source investigation starting from your name, email, and username. The Mirror maps publicly available information across breach databases, people-search platforms, the data broker surface, social profiles, and dark web records — producing a structured PDF report with per-category risk scoring and a prioritized action plan.
Delivery: 48 hours · Data purged within 48 hours of delivery · First-party consent required
For you if: you’ve been at a breached company, or suspect your credentials are circulating in dark forums or data dumps.
The Lockdown goes one layer deeper than The Mirror — into corporate data dumps, credential pair databases, dark forum archives, and pastebin repositories. It identifies which of your accounts are at realistic risk of takeover, and what to do about it. Includes the full Mirror investigation as its foundation.
Delivery: 48 hours · 30-day follow-up window · Includes The Mirror
For you if: you are being targeted, harassed, or impersonated — or at elevated personal risk and need a threat profile built.
The Shield builds a full threat profile: deep social media investigation, pattern-of-life analysis, social engineering vulnerability assessment, forum scrub coordination, and optional family member exposure checks (€750/person). Scoped individually on intake.
Delivery: scoped at proposal stage · Email to discuss before committing
For you if: your data is on people-search and data broker sites and you want it removed — not just documented.
Full execution: manual data broker removal across 150+ sites, people-search engine opt-out, Google search result suppression strategy, and a 90-day re-scrub guarantee. The Eraser is for people who want the exposure eliminated — not just documented — and who do not want to spend months on opt-out forms themselves.
Execution: 6–8 weeks · 90-day re-scrub included · Includes Mirror + Lockdown
For you if: you need to assess executive digital exposure or map your organisation’s attack surface.
Consented executive digital footprint audits, corporate attack surface mapping, third-party vendor exposure review, and quarterly posture assessments for organisations. Scoped by proposal based on the number of individuals to be assessed and the depth of engagement required. For NIS2-scoped engagements, see our NIS2 compliance mapping page.
Delivery: scoped at proposal stage · Starting at €5,000 · Request a proposal to begin
Digital exposure review ahead of an IPO, M&A, board appointment, or major media appearance.
€1,500 · Any client
Family Office Privacy Pack
Principal plus up to 4 family members — full removal execution, 1-year Guardian retainer included.
from €8,500 · Standalone
Add-On Scope & Use Cases
Detail on the add-on engagements clients ask about most.
OPSEC hardening & consulting
OPSEC consulting and hardening is what an exposure assessment turns into once you decide to act on it. The OPSEC Hardening Session is a 90-minute working consultation paired with a written checklist scoped to your threat model.
We work across three layers:
Device hardening — operating-system configuration, browser isolation, MDM posture for personal devices, and the trade-offs between privacy and recoverability.
Account hardening — authentication factors, recovery paths, session-token hygiene, and which third-party connections to revoke.
Communication hardening — channel selection by sensitivity tier, metadata exposure in everyday tools, and the limits of end-to-end encryption.
Digital opsec hardening is rarely a one-time job. The session closes with a checklist you can re-run quarterly and a list of changes that require monitoring rather than a single reset.
Most clients book the session alongside the Shield when an active threat is in play, or after Mirror delivery once exposure has been mapped. It also stands alone for clients who already understand their exposure and need execution help.
Compare Services
Five tiers across seven dimensions.
Mirror
Lockdown
Shield
Eraser
Corporate
Price
€595
€995
from €2,200
€3,800
from €5,000
Platforms checked
150+
150+
150+
150+
Per scope
Dark web coverage
Breach DBs
+ Credential pairs
+ Forum monitoring
+ Stealer logs
Full
Social engineering profile
—
—
✓
✓
✓
Data broker removal
Report only
Report only
Report only
Full execution
Per scope
Delivery
48 hrs
48 hrs
Scoped
6–8 weeks
Scoped
Follow-up
—
30 days
30 days
90-day re-scrub
Quarterly
How Consent Works
Written authorisation is signed before any investigation begins.
We only conduct first-party investigations — we investigate you, at your request.
All collected data is purged within 48 hours of delivery (or as agreed in writing).