Our methodology
How DataLeakz checks for breaches, what data we store, where our data comes from, and why you can trust the results while still understanding the limits.
01 How a breach check works
When you enter an email address into DataLeakz, this is what happens:
For public searches by visitors who are not signed in, we do not store the email address entered. For monitored emails inside your account, we store the email so we can alert you when new breaches are found.
02 The k anonymity model
k anonymity is a privacy technique that lets us check your email against a remote database without revealing your actual email to that database. This is how it works:
This means even if the API were ever compromised, it would only show that someone checked a hash prefix, not the real email address. The same privacy idea is used by major browsers for password checking.
03 Our data sources
Our breach database is built from multiple sources:
04 How we score breach severity
Each breach gets a risk score from 1 to 99 based on:
- Data types exposed such as passwords, financial data, usernames, or email addresses
- Recency because newer breaches often create more immediate risk
- Verification status because confirmed breaches should not be treated the same as unverified dumps
This score helps organize your dashboard so you can focus on what matters most instead of treating every breach the same way.
05 Limits and transparency
No breach checker is complete. Here is what ours can and cannot do:
- We can tell you if your email appeared in a known indexed breach
- We cannot tell you if your data was taken in a breach that has never been publicly disclosed
- We cannot tell you exactly what an attacker currently has
- We cannot guarantee that our database contains every public breach
A clean result means your email was not found in the breaches we currently know about. It does not mean your data is fully safe. That is why ongoing monitoring is better than checking only once.
06 Responsible use of breach data
We index breach data to help people protect themselves. We do not:
- Sell breach data to third parties
- Allow bulk downloads of our breach database
- Provide data in a way that could support harm
- Index data from breaches that have not been publicly disclosed
If you have concerns about how we handle breach data, or if you believe data should be removed from our database, please contact us at privacy@dataleakz.com.