Activate Security

Transparency Report: The Truth About Data Requests

Every six months, we publish detailed statistics about government requests, security incidents, and how we protect your data. Because you deserve to know exactly what's happening behind the scenes.

Current Reporting Period: January 1, 2025 - June 30, 2025

This report covers all government data requests, law enforcement inquiries, security incidents, and related transparency metrics for the first half of 2025. Previous reports are available at the bottom of this page.

Government & Law Enforcement Data Requests

7

Total Requests Received

0

User Data Provided

3

Legally Invalid Requests Rejected

4

No Data Available to Provide

Request Breakdown by Type:

Subpoenas: 3

2 rejected (overly broad), 1 provided basic account info (email, signup date)

Court Orders: 2

Both had no data available to provide

National Security Letters: 0

None received this period

Emergency Requests: 2

1 rejected (insufficient justification), 1 provided minimal account metadata

What We Can (and Cannot) Provide to Authorities

✓ Information We Can Provide:

  • Account email address
  • Account creation date
  • Last login timestamp
  • Subscription status and billing country
  • IP address used for account creation (if logged)

This is basic account metadata. It tells authorities an account exists but reveals nothing about how it's used.

✗ Information We Cannot Provide:

  • Websites visited or VPN browsing history
  • Content of encrypted files or vaults
  • Passwords stored in password vault
  • VPN connection logs or IP addresses assigned
  • DNS queries or traffic metadata

This data doesn't exist in our systems. We designed our architecture specifically to avoid collecting it.

Warrant Canary & Gag Orders

Some government data requests come with gag orders preventing us from disclosing them. To address this, we maintain a "warrant canary" - a statement we can remove if we're ever subject to such orders.

Current Warrant Canary Status: Active

Last Updated: October 30, 2025

As of this date, Activate Security has never received any National Security Letters, FISA orders, or other classified requests for user data that we are prohibited from disclosing. We have never been subject to gag orders preventing us from informing users of government data requests.

Security Incidents & Vulnerability Disclosures

0

Data Breaches

12

Vulnerabilities Found & Fixed

100%

Critical Issues Patched Within 24hrs

Vulnerability Disclosure Timeline (Last 6 Months):

Date FoundSeverityIssue TypeTime to FixUser Impact
Jun 2025MediumUI Information Disclosure3 daysNone
May 2025LowDependency Update1 dayNone
Apr 2025MediumRate Limiting Bypass2 daysNone
Mar 2025HighAPI Authentication Issue8 hoursNone - Fixed before exploitation

Full vulnerability disclosure details available 90 days after patch deployment to ensure all users have updated.

Bug Bounty Program Statistics

47

Reports Submitted

12

Valid Vulnerabilities

$38K

Bounties Paid

4.2

Days Avg Fix Time

Severity Breakdown:

Critical
0
High
1
Medium
4
Low
7

User Account & Service Statistics

Account Security

Account Takeover Attempts:1,247
Successfully Blocked:1,247 (100%)
2FA Adoption Rate:67%
Password Reset Requests:3,891

Service Performance

Uptime Percentage:99.97%
Average Response Time:142ms
Planned Maintenance Hours:4 hours
Unplanned Downtime:0 hours

Third-Party Data Breaches Affecting Our Users

Sometimes companies our users have accounts with get breached. Our dark web monitoring detected these breaches affecting Activate Security users this period:

Adobe Creative Cloud

Email addresses and password hashes exposed

Critical

38.4M records

LinkedIn

Profile information and email addresses

High

165M records

T-Mobile

Phone numbers, account PINs, and addresses

Critical

54M records

Robinhood

Email addresses and partial account information

High

7M records

How We Notify Users of Security Issues

Transparency isn't just about publishing reports - it's about keeping you informed when issues affect you directly. Here's exactly how we handle user notifications:

Immediate Notifications (Within 1 Hour)

  • Service outages affecting functionality
  • Security incidents involving user data
  • Critical vulnerabilities requiring user action
  • Third-party breaches affecting your accounts

Regular Updates (Within 24 Hours)

  • Non-critical security patches
  • Feature updates affecting privacy settings
  • Changes to terms of service or privacy policy
  • Planned maintenance schedules

Multi-Channel Communication

We don't rely on just email. Critical security notifications go out through:

• In-app notifications (immediate)

• Email alerts (within 15 minutes)

• Website banner (for all users)

• Social media updates (for public awareness)

Previous Transparency Reports

We've been publishing transparency reports since our founding. Each report provides complete statistics for its respective period:

H2 2024 Report

July 1 - December 31, 2024

H1 2024 Report

January 1 - June 30, 2024

H2 2023 Report

July 1 - December 31, 2023

H1 2023 Report

January 1 - June 30, 2023

Questions About This Report?

Have questions about our transparency practices, need clarification on statistics, or want to discuss security research?

Contact Our Team

We respond to all transparency and security inquiries within 24 hours

Security Through Transparency

Join users who value transparency as much as security. Because you shouldn't have to blindly trust your security provider - you should be able to verify everything we promise.

Get Started Now
✓ 30-day money-back guarantee✓ Cancel anytime