FAQs

Got Questions?

We've Got Straight Answers.

What do I need to submit?

To conduct a precise search, we require:  

– Your name (as used on dating apps)  

– Photos to ensure accurate identification  

– Your approximate age for verification purposes  

All data is securely submitted via encrypted channels and stored using Proton Drive’s end-to-end encryption, ensuring complete privacy protection.

Yes. We use end-to-end encrypted payment processors that comply with PCI DSS standards, ensuring secure transactions. We never store your payment details on our servers, and all processing is handled through verified payment gateways. 

Our team conducts a discreet search across AWDTSG-related platforms. Within hours, you’ll receive a private, verified report, securely stored using Proton Drive’s zero-access encryption, ensuring only you have control over the data.  

We scan AWDTSG-affiliated groups and apps, using legally compliant, non-invasive methods to identify relevant information without violating privacy laws.

We offer several secure, discreet ways to get in touch — whether you’re requesting a scan, need help with AWDTSG posts, or prefer full anonymity.

We reply within 1 hour (8 AM – 6 PM, 7 days a week).

We operate fully within legal frameworks, following ethical investigation practices. We do not hack, scrape, or access unauthorized data. All searches adhere to applicable privacy and data protection laws. 

We employ strictly anonymous search methods, ensuring that your inquiry remains completely untraceable. At no point do we engage in direct interactions that could compromise your privacy or reveal your request. We do not communicate with Facebook, its moderators, or the original poster in any capacity, ensuring that no links between your search and any external parties exist. Our process is designed for maximum discretion, safeguarding your identity at every stage

All submitted data and reports are stored in Proton Drive, leveraging zero-knowledge encryption, meaning even we cannot access your data without your explicit permission.

Yes. Upon request, all stored data can be permanently deleted to ensure continued privacy and security.  Please contact us at info@personaalert.com

Unlike standard cloud services, Proton Drive provides zero-access encryption, meaning data is encrypted before it reaches storage, making it inaccessible to third parties.

No. Your report is shared via a secure Proton Drive link, accessible through any browser with encrypted authentication protocols. 

Yes. Our reports contain verified documentation that can be used in legal proceedings if necessary, including for defense strategies or removal requests. 

Reports are stored securely for a limited period, after which they are permanently deleted unless you request continued monitoring. 

We implement:  

– Multi-factor authentication (MFA) to secure user accounts  

– AES-256 encryption for stored data  

– Secure transmission protocols (TLS 1.3) to prevent interception 

Yes. We offer follow-up searches to ensure ongoing monitoring and protection if needed. Please check the options on the home page.

Yes. We have access to both Are We Dating The Same Guy? and Tea Dating Advice, allowing us to cross-reference data from these platforms as part of our investigative process. This enhances the accuracy and scope of our searches while maintaining strict privacy and security protocols.

Depending on your jurisdiction, takedown requests may fall under:  

– Right to be Forgotten (GDPR) in the EU  

– Digital Millennium Copyright Act (DMCA) in the US  

– Data Protection Act (UK & other regions)  

We provide legal guidance to assist in the removal process. This has an additional cost.

If no results appear, you can opt for:  

– Ongoing monitoring  

– A preventative security consultation  

– Future re-checks if concerns arise 

This process requires expert investigation, legal discretion, and advanced security measures—none of which should be handled casually. Like any professional service, we offer verified expertise, ensuring safe, effective, and confidential results. 

We’ll provide clear next steps, including documentation for legal counsel or takedown efforts.

Yes. We can conduct multi-city scans across AWDTSG and Tea Dating groups to broaden the search scope and increase your coverage.

While our primary focus is AWDTSG-related platforms, we offer optional scanning of dating app data for clients with additional concerns.

We recommend subscribing to our monitoring service to stay alerted to reposts or new
mentions, especially in high-traffic groups.

Yes, but you must have legal consent from the individual you are submitting on behalf of. This ensures compliance and ethical use.

No — our process does not involve your personal Facebook account. We handle everything internally using our verified access.

We cross-reference your image, name, aliases, and context to avoid false positives. You’ll only
receive posts that meet a verified match threshold.

Never. We strictly observe and extract public-facing content from within groups — no
outreach, no alerts, no interaction.

No — we’re a vetted, legal, encrypted service with strict privacy protocols. Many freelance offers are risky, unverified, or illegal.

Only if you opt into our monitoring program. Otherwise, your one-time report reflects only what exists at the time of search.

We still include this in your report. Reverse image identification ensures you see anything linked to your likeness, regardless of misused names.

This varies by group moderation. However, we recommend downloading and saving any flagged posts immediately. Our reports are timestamped and stored securely.

Yes. We offer legal takedown support, including cease and desist letters, in collaboration with legal partners if necessary.

As a digital investigation service, we do not offer refunds once the search begins — similar to most legal or forensic audits.

Absolutely. We offer private consultations to walk you through the process, pricing, and strategy based on your case.

We can often find cached content or mentions that reference previously deleted posts, depending on timing and group activity.

Yes. We include direct screenshots of any posts or comments found, along with timestamps and source group names.

A basic search includes one city and image. Advanced packages offer multi-city coverage, alias scans, and continuous monitoring.

Yes, as long as you have legal permission to investigate that person, such as a child or client.

Yes. Posts in other languages can be translated and added to your report with annotations.

Our internal team maintains continuous access and adds new cities as groups evolve or new ones are created.

No. We use secure, anonymous methods that never involve your personal details or accounts.

We can help issue rebuttals or initiate removal procedures to protect your reputation.

While we can’t prevent users from posting, we can help you legally request takedowns and
monitor future threats.

We’re expanding to other reputation-based groups and private forums. Updates are posted to our home page.