Loophole is built for high-stakes, policy-sensitive problems - which means account security isn’t optional. It’s core to how we operate.
Here’s how we protect your identity, data, and platform access:
1. Identity verification
Every user goes through manual or automated identity screening before their account is activated. This includes email verification and phone number verification - which helps prevent impersonation, fraud, and abuse.
We may also request:
Government-issued ID
Business documentation (if applicable)
Additional verification steps for higher-risk requests
2. Device and access controls
We monitor for suspicious logins, device fingerprint mismatches, and abnormal usage patterns.
You may be required to re-verify your identity if your device, location, or behavior changes
Accessing your account from unauthorized regions (outside the U.S., U.K., or Canada) will result in automatic denial
You can review your login history and flag any suspicious attempts for faster investigation. Learn more →
3. Platform restrictions
To protect the integrity of our tools:
Accounts are single-user only
Shared or duplicated accounts are banned
Proxies, VPNs, and anonymizers may trigger security flags
All activity is logged and reviewed for misuse patterns
4. Internal safeguards
Sensitive requests are access-restricted to vetted team members
All uploads, AI prompts, and generated outputs are encrypted in transit
Our infrastructure is monitored 24/7 for unusual behavior or intrusion attempts
If you think your account has been compromised:
Change your password immediately
Email Security [at] Loophole (dot) com with a summary of what happened
We may lock the account temporarily to investigate and protect your data
