SIM swappers, extortionists, and home invaders use data brokers to find crypto traders and founders. We systematically erase your digital footprint before they do.
Your OpSec means nothing if your home address is on Spokeo for $0.50. SIM swap attacks have drained millions. $5 wrench attacks have put crypto holders in hospitals. Hackers don't need to break your wallet - they just need to find your house. Data brokers have your address, your phone number, your family members' names. Your on-chain privacy is worthless if your off-chain identity is exposed. We exist to close that gap - systematically, legally, and permanently. This is not paranoia. This is operational security.
Hackers social engineer your phone carrier using your personal data from broker sites. They port your number, bypass 2FA, and drain your wallets in minutes. Your exposed phone number is the attack vector.
Armed home invasions targeting crypto holders. Attackers find your address through data brokers, show up with weapons, and force you to transfer everything. No hardware wallet protects against a gun to your head.
Attackers craft hyper-personalized phishing using your family members' names, your previous addresses, your employer history. When an email mentions your wife by name, you click. That's how they get in.
Make one wrong take and anons will find your real name, your home, your family. Data brokers make doxxing trivial - your entire life is one Google search away. All it takes is one person with a grudge.
Physical attacks on crypto holders doubled in 2025. These are real cases.
David Balland, co-founder of hardware wallet company Ledger, was abducted by kidnappers who mutilated him while demanding cryptocurrency ransom. Police rescued him after an extensive operation.
Danylo Kuzmin was lured to a meeting by a classmate who knew about his crypto holdings. He was kidnapped, tortured, and murdered. His body was burned in his own car. The attackers got $200,000.
Attackers dressed as Canada Post workers invaded a family's home. They held the family hostage overnight, waterboarding and sexually assaulting them while stealing $1.6 million in Bitcoin.
Attackers used a leaked database that linked a wallet address to a home address. They dressed as delivery drivers, forced entry at gunpoint, and stole £4.3 million in cryptocurrency.
Gilbert St. Felix received the longest sentence ever in a US crypto case for leading a violent home-invasion ring. His crew targeted crypto holders across multiple states using brutal tactics.
Security researcher Jameson Lopp has documented over 70 physical assaults on crypto holders in 2025 - double the previous year. The real number is likely higher as many go unreported.
Physical attacks on crypto holders are accelerating
| Year | Documented Physical Attacks | Change |
|---|---|---|
| 2022 | 22 | - |
| 2023 | 42 | +91% |
| 2024 | 150 | +257% |
| 2025 | 215+ | +43% (and counting) |
Source: Jameson Lopp's Physical Crypto Attacks Database, Bloomberg
AI can clone you with a few seconds of audio or a single photo. Attackers use your digital footprint to impersonate you.
Scammers need just 3 seconds of audio to create a voice clone with 85% accuracy. They scrape this from your social media videos, podcast appearances, or YouTube clips. Then they call your family pretending to be you - crying, in distress, begging for money.
68% of video deepfakes are now indistinguishable from real footage. Your photos on LinkedIn, Twitter, or data broker sites train AI models to create synthetic videos of "you" - authorizing wire transfers, endorsing scams, or compromising your reputation.
Attackers combine your exposed data with AI cloning:
In July 2025, Sharon Brightwell received a call from her "daughter" - crying, claiming she'd been in a car accident and lost her unborn child. The voice begged for $15,000 for legal fees. Sharon wired the money immediately.
It wasn't her daughter. It was an AI clone trained on social media audio.
Every photo of you online is training data. Your LinkedIn headshot. Your Twitter profile. Your conference speaker photo. The more images of your face exist online, the easier it is to create convincing deepfakes. Removing your photos from data brokers and public sites reduces the raw material attackers need to impersonate you.
Three tiers of digital liberation
The foundational playbook for crypto natives who handle their own OpSec, or for delegation to a trusted team member.
For traders and founders who want speed and expertise. Includes strategy calls to prioritize your highest-risk exposures first.
White-glove execution for traders and founders whose time and security are non-negotiable. We handle the 50+ hours of systematic removal.
Three steps to digital invisibility
We start with a 30-minute call to understand your exposure level. We'll run a preliminary scan and show you exactly what's out there - your addresses, phone numbers, family connections, and more.
We systematically scan 500+ data brokers, people-search sites, and public records. Then we submit removal requests using GDPR, CCPA, and direct opt-out procedures. We handle the back-and-forth so you don't have to.
You receive a detailed report showing before/after status for every site. We continue monitoring for 6 months to catch re-listings and ensure your data stays gone.
The initial audit is delivered within 72 hours. Full removal across all identified sites typically takes 4-8 weeks, as each data broker has different processing times. Some respond within days; others require follow-up. We handle all of it and keep you updated with monthly progress reports.
This is common - data brokers scrape new records constantly. That's why our Tier III service includes 6 months of monitoring. If your data reappears anywhere, we catch it and remove it again at no extra cost.
We remove the source pages that appear in Google results. Once those pages are down, Google's index updates automatically (usually within 2-4 weeks). For EU/UK clients, we can also file "Right to be Forgotten" requests directly with Google for faster deindexing.
We use end-to-end encrypted communications (ProtonMail, Signal). We never store your data on cloud servers. All client information is deleted upon project completion unless you request ongoing monitoring. We practice what we preach.
Those services are automated and cover ~50-100 sites. We manually audit 500+ sources, including niche brokers and public records they miss. We also handle stubborn sites with legal requests, provide personal strategy calls, and focus specifically on high-risk individuals in crypto. It's white-glove service vs. assembly line.
Yes. We work with clients globally. For EU/UK clients, GDPR gives you stronger legal leverage - we use Article 17 "Right to Erasure" requests. For clients in other jurisdictions, we adapt our approach based on local privacy laws and the data brokers relevant to your region.
Your cold storage is secure. Your hardware wallet is airgapped. But your home address is on Spokeo for $0.50. SIM swappers don't hack your wallet - they hack your phone carrier using personal data from broker sites. $5 wrench attackers don't break your encryption - they find your house and show up with weapons. Your on-chain OpSec is worthless if your off-chain identity is exposed.
We provide a systematic, legally-backed protocol to erase your digital footprint. We map every data broker, people-search site, and public record that exposes your real identity - then we delete it. What remains is verified absence, documented in a report you can trust.
Your bags are safe. Is your family?
All communications are confidential. Encrypted channels available. We respond within 24 hours.