Evidence Checklist
What to collect before you request a quote
Strong reports start with clear, minimal evidence: the fake profile, proof of the real account or identity, and a short description of the harm. Keep private material out of first-pass intake.
Capture the fake profile
- Full profile URL or username
- Screenshots showing name, photo, bio, handle, and follower context
- Any posts, comments, messages, or payment links tied to the impersonation
Prove the real identity or brand
- Your official profile, website, or business listing
- Creator, business, or professional account proof when available
- Prior platform report receipts or case numbers
Document harm without over-sharing
- Short notes on scams, harassment, confusion, or brand damage
- Screenshots from people who were contacted by the fake account
- Dates and times for urgent activity, threats, or active scams
Privacy-first handling rules
The goal is to prove impersonation without spreading sensitive material further. If private media is involved, start with a description and let the quote flow flag the safer next step.
Do not upload intimate/private media during first-pass intake.
Do not email sensitive originals unless a safer handling path is agreed.
Use screenshots that prove the issue while minimizing unrelated private details.
Blur unrelated names, faces, addresses, payment details, and message content when possible.
Ready to see the recommended scope?
Submit the fake profile and a short description. You will see the recommended tier and evidence needs before secure checkout.