Veri Sızıntısı

Frequently Asked Questions

Answers to your questions

General Questions

What is Veri Sızıntısı Platform?

Veri Sızıntısı Platform is a non-profit, free security and awareness project that allows you to check if your personal information, such as emails and passwords, has been exposed in online data breaches. Its purpose is to notify you of leaks and guide you to stay safe.

Is this service really free? What is your revenue model?

Yes, all core services for individual users are completely free and will always remain so. This project was founded to benefit the community, not to make a profit. It is currently sustained by the founder's personal efforts and aims to continue with community support and potential sponsorships for future operational costs.

Who should use this platform?

Anyone who uses the internet! If you have an email address, use social media, or shop online, your data is potentially at risk. This platform is for everyone who wants to take a proactive step toward their digital security.

What is the ultimate goal of this project?

Our primary goal is to increase cybersecurity awareness and provide a simple, accessible tool for everyone to protect themselves. We aim to take knowledge out of the hands of cybercriminals and give the power back to the users so they can defend themselves.

Who is behind this project?

Veri Sızıntısı Platform was founded and developed by Mehmet Eren Akyol, an expert with many years of experience in the cybersecurity field. It began as a personal passion project out of a desire to contribute to a safer digital community.

Security and Privacy

How secure is the data I add to the platform?

Security is our number one priority. All data you add to the platform, such as your email addresses, is stored in an encrypted format in our database. All of our infrastructure is hosted on secure servers located in Turkey. As a project founded by a cybersecurity expert, we apply up-to-date industry best practices to protect the platform and your data.

Do you store my current account passwords?

No, absolutely not. Our platform never asks for or stores your current passwords for any of your accounts. The only passwords we process are those that have already been exposed in previous data breaches. Our purpose is to show you which of your old passwords have been compromised so that you never use them again.

Can someone else see my leaked data through your platform?

No, they cannot. To view sensitive details like a leaked password for a specific email address, you must first prove that you own that address. We do this by sending a unique confirmation link to that email address. Only the person with access to that inbox can complete the verification and view the leak details.

Is the platform compliant with laws like KVKK/GDPR?

Yes, our platform operates in the spirit of data protection laws like KVKK and GDPR. Our core purpose is to empower the data subject (you) by informing you about the security status of your own data. We only show you your data after you have verified ownership, and we provide you with easy tools to permanently delete all your data and your account at any time.

How can I permanently delete my account and data?

You are in full control. You can easily and permanently delete your account, all of your added digital assets (emails), and all related notifications directly from the "Settings" page in your dashboard. This action is irreversible.\n\nImportant Note: Please be aware that this action only deletes your records from the verisizintisi.com database. It does not affect the original source from which your data was leaked (e.g., the hacked website). Our purpose is to notify you of the leak, not to remove the data from its source.

Usage and Features

How exactly does the platform work?

Our platform works in a simple 3-step process:\n\nYou perform a quick initial check by entering your email address on the homepage.\n\nIf a leak is found, you register for free to see the details.\n\nAfter logging in and verifying your email, you see all the details, such as which site the leak came from, your leaked password, and what you need to do to secure your account.

What is the difference between the initial check and becoming a member?

The initial check on the homepage only tells you if your email address was found in a breach and in how many breaches. When you become a free member and verify ownership of your email, you can see the full details: which sites were breached, what passwords were exposed, and our specific security recommendations for you.

How do I add and verify a new email address?

After logging into your dashboard, go to the "My Digital Assets" section. Enter the email address you want to monitor and click the "Add" button. We will then send a verification link to that email address. You must click that link to prove you are the owner and begin seeing the results.

What should I do if a leak is found?

The most important thing is not to panic. The first step is to immediately change the password for the compromised account. If you used the same password on other sites, you must change those as well. Our platform will provide you with a list of recommended actions on the leak details page. You can also find detailed guides in the "Protection" category of our blog.

Does the platform automatically check for new leaks?

Yes. Once you add and verify an email address, our system continuously monitors it. If that email address appears in a new data breach that we add to our database, you will receive an instant notification, allowing you to take immediate action.

Database and Sources

Where do you get this leaked data from?

Our data comes from publicly circulating "combolists" and breached databases that are often shared on the darknet, various forums, and Telegram channels. Our team and automated systems continuously monitor these sources to acquire new data sets. Our goal is to collect this scattered and dangerous information under one secure roof for you to check.

How often is your database updated?

Our database is updated continuously. We have automated systems in place that constantly search for, parse, and integrate new data leaks. As soon as a significant new breach is acquired and processed, it is added to our system for you to check against.

How can I be sure your data is accurate?

The data we process is raw data from actual breaches. When our system shows that your password was part of a leak, it means that specific email-password combination was found exactly as shown in a breached database. However, this is historical data. If you have changed your password since the breach occurred, the leaked password is no longer a current threat for that specific account (but you should never use it again anywhere else).

I know about a breach, but it's not showing up in your system. Why?

While we strive to have the most comprehensive database possible, we may not have every single breach that has ever occurred. There could be several reasons for this: some breaches are never made public, some are sold privately and not shared, or we may not have acquired and processed that specific dataset yet. We are constantly working to expand our database.

Does your database contain data only from Turkey, or from all over the world?

Our database is global. Since data breaches know no borders, we collect and process leaked data from all over the world, regardless of the country of origin. Our goal is to protect all internet users.