Review type
Manual public-source OSINT review
Sample report
See how a manual OSINT privacy report may be structured, what types of public-source observations may be included, and how practical recommendations are presented.
Get Privacy Report — Full Individual Privacy Report
Report type
Subject
Region
Price reference
Manual public-source OSINT review
Fictional demonstration sample
Get Privacy Report
Usernames
Email indicator
Search observations
Public profile observations
Social visibility observations
Breach indicators are fictional only
Risk assessment
This is an indicative privacy-awareness rating based on public-source visibility, username reuse, profile exposure, and data minimisation concerns. It is not a legal, credit, cybersecurity, or identity-theft risk score.
Indicative score: 58 / 100
Name: Alex Taylor
Common name: Alex T.
Location: Australia
State/Territory: Western Australia
Email: alex.example@email.com
Usernames: alextaylor88, alex.t.photo, ataylor.photo
Recommendations
Correlation
The more often the same username, photo, email, or biography appears across platforms, the easier it may be for someone to connect separate accounts.
Fictional observations suggest several identity fragments could be linked through repeated usernames and public profile context.
Exposure categories
Count: 3
Example: alextaylor88 appears similar to ataylor.photo.
Privacy note: Reduce reuse across unrelated accounts.
Count: 1
Example: alex.example@email.com appears in a fictional exposure indicator.
Privacy note: Avoid publishing a primary email.
Count: 6
Example: old profile snippets connect name and username.
Privacy note: Review stale listings.
Count: 4
Example: public bio includes broad WA location and photo interest.
Privacy note: Keep bios minimal.
Count: 5
Example: profile photos and tagged content are visible publicly.
Privacy note: Enable tag review.
Count: 3
Example: community mentions suggest a broad region.
Privacy note: Avoid exact routines or addresses.
Search visibility
These are fictional examples and do not represent real websites or real search results.
example.com/profile/alex-taylor
Snippet links Alex T. with photography interests and a broad Australian location.
demo-directory.example/events/alex-t
Snippet includes a public event mention and broad regional context.
sample-profile.example/users/alextaylor88
Snippet shows an older username that could connect to current public profiles.
example.com/people/alex-t-photo
Snippet displays a short public bio and repeated profile image.
Search full name, common name, usernames, and email periodically. Request correction or removal where platforms allow. Update or delete old profiles. Avoid exposing unnecessary contact or location details.
Profiles
Bio details may reveal interests, broad location, or contact patterns.
Older public activity may appear without current context.
Tags can connect people, events, and locations beyond your own profile.
Repeated images can make separate profiles easier to connect.
Visible connection lists can expose social context.
Small bio details can add up when combined across profiles.
Breach awareness
This fictional sample shows how breach indicators may be summarised if relevant public breach information is identified. It is not a real breach finding.
Data type potentially exposed: email, username.
Recommended action: check account recovery options and watch for targeted spam.
Data type potentially exposed: email, username, hashed password, IP address.
Recommended action: change reused passwords and enable MFA.
Data type potentially exposed: email, username, hashed password.
Recommended action: secure the email account first, then update affected services.
A privacy report may include public breach exposure indicators where available. Customers should treat any possible exposure as a reason to improve password hygiene and MFA: use unique passwords, use a password manager, enable MFA, secure the email account first, and review recovery emails and phone numbers.
Reputation
Search results can influence first impressions. Old public content may appear out of context, and professional profiles should be consistent and intentional. Public personal details should be minimised where they are not needed.
Update professional profiles, remove outdated public bios, review old comments or posts, and create a clean intentional public presence if desired.
Priorities
Priority: Medium
Why it matters: Makes separate accounts easier to connect.
Recommended action: Use different usernames for personal, professional, and sensitive accounts.
Priority: Medium
Why it matters: Can reveal location, work, interests, or contact patterns.
Recommended action: Reduce unnecessary public bio details.
Priority: Medium
Why it matters: Can increase spam, phishing, or impersonation risk.
Recommended action: Use aliases and avoid publishing primary email publicly.
Priority: Low to Medium
Why it matters: Can create outdated impressions.
Recommended action: Request updates or removal where possible.
Priority: Medium
Why it matters: Posts, tags, and followers may expose more than intended.
Recommended action: Review privacy settings and enable tag approval.
Checklist
Start with the highest-impact actions first, then review your online footprint regularly.
Action plan
Search your public identifiers.
Secure your main email account.
Review social media privacy settings.
Review old accounts and username reuse.
Check public profile details and search results.
Start removal or update requests where appropriate.
Set up a quarterly privacy review routine.
Boundaries
No real personal data, passwords, financial records, medical records, or government ID information.
No private account content and nothing obtained through hacking or private access.
No real breach confirmation, guaranteed removal, or guaranteed completeness.