Skip to main content

How does Loophole keep my account secure?

Updated over 4 months ago

Loophole is built for high-stakes, policy-sensitive problems - which means account security isn’t optional. It’s core to how we operate.

Here’s how we protect your identity, data, and platform access:


1. Identity verification

Every user goes through manual or automated identity screening before their account is activated. This includes email verification and phone number verification - which helps prevent impersonation, fraud, and abuse.

We may also request:

  • Government-issued ID

  • Business documentation (if applicable)

  • Additional verification steps for higher-risk requests


2. Device and access controls

We monitor for suspicious logins, device fingerprint mismatches, and abnormal usage patterns.

  • You may be required to re-verify your identity if your device, location, or behavior changes

  • Accessing your account from unauthorized regions (outside the U.S., U.K., or Canada) will result in automatic denial

  • You can review your login history and flag any suspicious attempts for faster investigation. Learn more →


3. Platform restrictions

To protect the integrity of our tools:

  • Accounts are single-user only

  • Shared or duplicated accounts are banned

  • Proxies, VPNs, and anonymizers may trigger security flags

  • All activity is logged and reviewed for misuse patterns


4. Internal safeguards

  • Sensitive requests are access-restricted to vetted team members

  • All uploads, AI prompts, and generated outputs are encrypted in transit

  • Our infrastructure is monitored 24/7 for unusual behavior or intrusion attempts


If you think your account has been compromised:

  • Change your password immediately

  • Email Security [at] Loophole (dot) com with a summary of what happened

  • We may lock the account temporarily to investigate and protect your data

Did this answer your question?