Contact ObscureIQ

Confidential. Secure. Always on your side.

For High-Risk Individuals and Teams Who Can't Afford Exposure

ObscureIQ is trusted by public figures, executives, and organizations navigating complex threat environments.

Whether you’re facing a live risk or looking for proactive protection, we’re here. Quietly and effectively.

Need to speak discreetly?

We understand the stakes. Use the channel that fits your risk level. We’ll take it from there.

Choose a time that works for you.
No long forms or intake hurdles. 🔗

Join our ObscureIQ Secure Room for encrypted messaging. 🔗

Write directly at: info@obscureiq.com
Use discretion. Email is not the safest channel for details. Try GuerillaMail or see PGP instructs below.

772-207-0046
(Voice only. No caller ID restrictions.
This is a burner line.) 🔗

Privacy & Trust

Your visit is private. Your contact is on your terms.

At ObscureIQ, we believe privacy should begin before you ever reach out. Below, we’ve answered the most common questions about how we handle contact. And why we’ve chosen not to collect information unless you choose to share it.

No. We do not use tracking cookies, fingerprinting, or analytics scripts. This page is designed for privacy-conscious individuals. Your visit is not logged or traced.

Our whole site is devoid of tracking, excepting a couple of landing pages where we can’t avoid Google analytics if we want to advertise there. We wall these pages off from everything else.

No. We don’t use web forms. If you’d like to reach out, we provide secure contact methods. Private Signal messaging. Encrypted email. Burner-safe phone channels.

No. We collect no visitor identity information by default. We believe privacy should begin before you make contact with us.

We offer multiple secure options:

  • Signal messenger

  • Encrypted email (PGP available upon request)

  • Temporary or anonymous inbox (try GuerrillaMail)

  • Optional secure intake link (no browser fingerprinting)

Choose what works for your risk profile.

Note that clients receive a special communication document with different addresses and protocols for reaching us. 

Because we’re not like other companies. Our mission is to reduce exposure, not increase it. We don’t need your name or browser metadata to help you start the process. Privacy begins before first contact. We take that seriously.

Reaching Out

No pressure. Just clarity, support, and action.

Whether you’re facing a threat, protecting your family, or just curious about your exposure, we’re here to listen, assess, and advise without pressure. These FAQs cover how we work with high-profile individuals, families, and teams.

Yes. We understand that privacy starts at hello. You can withhold identifying information until you’re comfortable. We’ve worked with whistleblowers, litigants, and individuals under extreme scrutiny.

Absolutely. Our team can perform a preliminary exposure review or footprint scan and let you know whether you’re at elevated risk. No pressure, no sales pitch — just clarity.

Yes. We often work alongside legal counsel, personal security teams, and private advisors. We’re used to handling high-risk, high-discretion scenarios.

Not at all. You can maintain an active digital presence. We help you reduce risk without deleting your identity.

Immediately. If you’re under active threat or experiencing doxxing, our team can begin mitigation within 24 hours. For other cases, we typically begin with a secure intake and threat evaluation.

You don’t have to figure it out alone. We’ll evaluate your situation carefully. If we’re not the best fit, we’ll point you to someone who is.

Secure Email Communication with ObscureIQ

The privacy and security of your communications with are paramount. We trust Pretty Good Privacy (PGP) encryption to ensure that sensitive information you send via email remains confidential.

Unencrypted email is not safe.

Our PGP Public Key
To send us an encrypted message, you’ll need our PGP public key. This key allows you to encrypt messages that only we can decrypt with our private key.

Download Our Public Key:

Download Our PGP Public Key (.asc) (Right-click and “Save Link As…” or “Download Linked File As…”)

Verify Our Key Fingerprint
It’s crucial to verify that the public key you’ve downloaded is authentic and hasn’t been tampered with. After you import our public key into your PGP software, compare the fingerprint displayed in your software with the one listed below. They must match exactly.

Our PGP Key Fingerprint:

C5C91254779E26091E5F56636D0527A04E6E1538

Step-by-Step Instructions: Encrypting Your Message
Here’s how to use our public key to send us an encrypted message:

  • Download Our Public Key: Click the download link above and save the .asc file to your computer.
    • Import Our Public Key:
    • Kleopatra (Windows): Open Kleopatra, go to “File” > “Import Certificates,” and select the downloaded .asc file.
    • GPG Suite (macOS): Double-click the downloaded .asc file.
    • Thunderbird with OpenPGP: Go to “Tools” > “OpenPGP Security” > “Key Management,” then “File” > “Import Keys From File,” and select the .asc file.
    • Mailvelope (Browser Extension): Open Mailvelope, go to “Key Management,” click “Import,” and either paste the key content or upload the .asc file.
  • Verify the Fingerprint:
    • Once imported, locate our key in your PGP software.
    • Check the key details and find the fingerprint.
    • Compare this fingerprint meticulously with the “Our PGP Key Fingerprint” listed on this webpage. If even a single character is different, do not proceed. Please contact us through a non-encrypted channel (e.g., phone) to report the discrepancy.
  • Encrypt Your Message:
    • Using your PGP software, compose your message and select our company email address info@obscureiq.com as the recipient for encryption.
    • Your software will use our public key to encrypt the message.
  • Send the Encrypted Message: Send the encrypted text or file to info@obscureiq.com.

If you have any questions about using PGP or encounter issues, we can help, but of course contacting us may compromise your privacy, so do that carefully.

Our Best Privacy Guides

OIQ Privacy Guides 2025

Need a map to navigate the maze of options available when you are choosing privacy technology? We rate, rank, and grade products and services on the axis we think are most critical for privacy and security.