Get a username to use in further investigations of the leak.
The system analyzes the uploaded sample, compares it to the original document, and determines which user owns the compromised copy.
If one of your confidential documents was leaked, just upload it into the LeaksID Investigation module to start the investigation.
Be sure that in case of a leak you can determine the name of the culprit without fail.
The average investigation time if the parts of the compromised document do not require an image editor.
An original document, a photo of a printed document, a photo or a screenshot of a screen, and even a distorted sample (wrinkled, dirty, photographed at an angle) will be suitable for an investigation.
To conduct an investigation, simply upload part or the entire compromised document to the system.
The investigation module interface is natively understandable. If necessary, we provide free training.