Dozens of websites publish your home address, phone number, and family relations — scraped from public records, free to search. Anyone can find where you live in 30 seconds. Coyote files removals across the 12 highest-impact sites and keeps you off them. Pay in sats after you see the report. No signup. No email.
✕Name + state
Never leave this page
⚡Email (optional)
Hashed in browser before sending
⛓0 trackers
No analytics or third-party scripts
↗Source open
Verify in DevTools or on GitHub
See full network trace and verification steps
Email — HIBP k-anonymity model
If you provide an email address, the browser computes SHA-1 of it locally. Only the first 5 hex characters of that hash are sent to HaveIBeenPwned's range API. Your full email never leaves this machine. HIBP returns hashes matching the prefix; the comparison happens locally.
Outbound requests during the scan
·1× GET api.pwnedpasswords.com/range/<5-char-hash>(only if email provided)
·0× requests anywhere else
This page loads
·0 analytics scripts
·0 third-party trackers
·0 advertising pixels
·All scanning code is in this single HTML file
Don't trust us. Verify.
→Open browser DevTools → Network tab → submit form → watch what leaves
OpenTimestamps proof-of-request anchored to Bitcoin
Signed authorized-agent CCPA / state-specific forms
Out of scope
Court records, voter rolls, property records (not removable by law)
KYC exchange data (5–7 year legal retention)
Breach dumps already in the wild
Permanent deletion — we don't claim it
Platforms that require you personally — Google Street View, Apple Maps, Zillow exterior photos, Wayback Machine, California DROP — surface in your exposure report as user-approved handoffs. Coyote opens the exact request, fills what it can locally, and leaves the irreversible submission to you. Your address never touches Coyote's servers.
▲ Independent forever
OpenTimestamps proofs verify against Bitcoin's blockchain, not Coyote's servers. Your receipts remain valid even if Coyote disappears.
Every removal request is hashed locally and anchored to a Bitcoin block via the OpenTimestamps protocol. The proof is yours, portable, and verifiable by anyone — without trusting us, our servers, or our continued existence.
Broker lookups happen locally. Coyote does not receive your name, address, phone, or email.
0 outbound requests · all scanning local · verify in DevTools Network tab
Press Run local audit on the home screen to start.
▲ EXPOSURE REPORT
Your home address is a 30-second search.
Scan complete. Here is what is exposed in public databases right now.
Report stored locally only · 0 outbound requests during this scan · nothing shared with Coyote
23
Broker profiles found
14
Sites listing your address
4
Breaches matching your email
Threat model · deterministic scoring
Weighted rules · every score shows its inputs
Physical targeting risk
7/10
address on 14 sites+5 ·
relatives linked to city+2
SIM-swap risk
6/10
phone on 9 people-search sites+5 ·
phone matched a known breach+1
Crypto-correlation risk
7/10
email in Ledger 2020 (large subset included postal addresses)+4 ·
BTC holdings mentioned in 2 social posts+3
Pretexting risk
4/10
relatives + city triangulated+2 ·
employer guessable from public profile+2
Critical exposure
High
Your home address is on 14 broker sites
Spokeo, Whitepages, BeenVerified, Radaris, MyLife, Intelius, FastPeopleSearch +7 more. Tactical address available in a 30-second search.
High
Email found in 4 known breaches
Includes Ledger 2020 (a breach that included postal addresses for ~272K customers) and LinkedIn 2021. HIBP confirms the email match; treat as elevated physical-risk pending field-level confirmation. Credential rotation recommended in parallel.
Med
Phone number on 9 people-search sites
SIM-swap targeting risk. Carrier port-out lock recommended in parallel.
Med
6 relatives publicly cross-referenced
Family members' names and cities linkable to you. Used in pretexting attacks and physical surveillance.
Low
2 historical X / Reddit posts mention BTC holdings
Identified by content analysis. Manual review recommended; Coyote does not automate social wipe in v1.
▲ User-approved handoffs · finish in your own browser
Google Street View — image found for this address
Google requires proof of address for U.S. house blur. Coyote opens the request, pre-copies justification text, you upload the doc to Google directly. Permanent and irreversible once approved.
Apple Maps Look Around — imagery removal request
Manual review by Apple. Coyote opens the contact form with your address context. You submit; Apple confirms by email within 2–4 weeks.
Zillow / Realtor.com — exterior photos detected
Per-listing photo removal. Coyote opens each platform's listing-contact form pre-filled. You submit; platforms typically respond within 7 days.
What this result means: brokers re-aggregate from public records. Monitoring exists because removal alone is not enough. Every removal Coyote submits is hashed and anchored to the Bitcoin timechain as a proof-of-request — not a proof-of-removal.
▲ Three tiers · three buying moments
Remove what's exposed. Monitor what comes back.
Pick the tier that matches the moment. Sats-denominated. Fiat fallback at checkout.
Why 12 brokers, not 100? Optery covers 600+. Their own data shows the top 20 drive the majority of confirmed removals. We start with the 12 highest-impact people-search sites and expand based on real efficacy data after closed alpha — not marketing.
Public figures and family-office security teams: concierge support available on request.
▲ Erase + Monitor · 250,000 sats / year
Choose how you pay.
Lightning is fastest, on-chain is most resilient, fiat is least private.
What we receive: a paid-invoice event from BTCPay. We do not link it to your name, IP, device, or account. Your Coyote account number is generated locally on this device only after payment confirms.
▲ Lightning invoice · step 2 of 3
Scan with your Lightning wallet.
Or copy the bolt11 string. Invoice expires in 15 minutes.
On payment: Coyote generates your account number and recovery phrase locally. The only thing leaving your device is the Lightning payment itself.
▲ Payment confirmed · account created locally
You're in. Save your recovery kit.
This is your Coyote recovery phrase. It is not a Bitcoin wallet seed. If you lose this phrase, we cannot restore your account. There is no password reset and no support recovery.
Coyote will never ask for your Bitcoin wallet seed. The 12 words below are a Coyote-only recovery phrase, generated locally on this device. If anyone — including someone claiming to be Coyote support — asks for your wallet seed, it is a phishing attempt.
Coyote account number
7421 9856 3104 5728
12-word Coyote recovery phrase
01honey
02valley
03river
04silent
05copper
06radar
07anchor
08vault
09shadow
10signal
11orbit
12cipher
Lose this and the account is gone. Write down the Coyote phrase offline. Do not store it beside exchange passwords, screenshots, or cloud notes. This is the trade-off for an account that does not require email, password, or identity verification.
▲ Recovery verification · last step
Confirm you saved your phrase.
Type words #3, #7, and #11 from your Coyote recovery phrase. This is the same pattern hardware wallets use.
Reminder: these are Coyote words, not Bitcoin wallet words. The phrase shown on the previous screen is the one you just generated locally.
Why this step: users who skip phrase verification have a ~40% chance of losing the recovery information within 90 days (hardware-wallet onboarding data). Three words now, no recovery loss later.
▲ Erase in progress · account active
Coyote is working.
Last scan: 2 minutes ago. 8 removals confirmed. 11 awaiting verification. 4 queued for retry. Next sweep in 27 days.