Resources


FAQ

Frequently asked questions

Moving from passwords to biometrics is a major security shift. Here’s how Loop8’s passwordless system protects your data and stands out from traditional security.

  • question mark icon
    General Questions
  • gear icon
    Technical Support
  • person icon
    Account Management
  • privacy icon of a crossed out eye
    Privacy & Security

Loop8 is a Personal Privacy Controller that goes beyond password management to provide true identity authentication. Unlike traditional password managers that still rely on vulnerable master passwords, Loop8 uses biometric verification (Face-ID or fingerprints) instead of master passwords, addressing the root cause of 92% of all hacking attempts.

One Loop8 subscription protects up to 8 users, making it perfect for families and friend groups. This community-based model allows you to elevate everyone's security practices together while each person maintains their own private digital spaces.

Your subscription includes the complete Loop8 security ecosystem: passwordless authentication, MySafe digital safe, Authenticator (Auth) for multi-factor authentication, Privacy-Mate (Privacy-M8) dark web monitoring, Clean-Slate (Clean-SL8) cookie protection, Tech Person support, and the Tru8 connect system—all in one integrated app.

Yes, this is completely safe and expected. Our application is built using Microsoft's .NET technology, which requires the .NET Desktop Runtime to be installed on your computer to run. This is a free, official component from Microsoft (the makers of Windows).

It's a set of libraries and tools that many modern Windows applications need to function. Think of it like having Adobe Reader installed to open PDFs - it's a common requirement for certain types of software.

Absolutely. When you click the download button, you're directed to Microsoft's official website (dotnet.microsoft.com). Millions of Windows users have the .NET Runtime installed for various applications.

Unlike some system components, .NET Desktop Runtime isn't pre-installed on all Windows computers. You only need to install it once, and it will work for all applications that require it.

No. The runtime is lightweight and only uses resources when you're actively running applications that need it.If you have any concerns about the download, you can verify the installer is signed by Microsoft Corporation by right-clicking the file, selecting Properties, and checking the Digital Signatures tab.

Yes, Loop8 works seamlessly across your devices. Your data syncs securely through your personal cloud (iCloud or Gmail), never passing through Loop8's servers. This approach ensures your information remains accessible only to you while maintaining convenience across devices.

Loop8 makes transitioning simple. After installation, the app guides you through importing your existing passwords from browsers or other managers. As you log into sites, Loop8 automatically converts your accounts to biometric authentication, gradually eliminating password dependency.

For security reasons, our registration and login process requires VPN connections to be temporarily disabled.

How to register or log in:

  1. Disable your VPN connection
  2. Complete the registration or login process
  3. Once logged in, you can re-enable your VPN and use the app normally

Why is this necessary? VPN restrictions during registration and login help us prevent automated bot attacks, fraudulent account creation, and unauthorized access attempts. This is a common security measure used by many apps and services.

What about my privacy?

  • You only need to disable your VPN for the brief registration/login process (usually less than a minute)
  • Once logged in, you can immediately re-enable your VPN
  • All features of the app work normally with VPN enabled after authentication
  • We don't track your location or collect unnecessary personal data
Still having issues? If you've disabled your VPN and still can't register or log in, please check that:
  • Your VPN is fully disconnected (not just paused)
  • Any VPN browser extensions are also disabled
  • You're not using a proxy server

Setting up the Tech Person feature is simple. All you need to do is to send a text. The Tech Person can assist with setup and maintenance while appropriate privacy boundaries remain in place, making advanced security accessible to everyone.

Tru8 puts recovery control entirely in your hands. You select trusted contacts who can verify your identity if needed. If you lose your phone, these contacts receive a verification request. Once confirmed, your data is securely restored to your device. You can change these contacts anytime, and they'll never know if you remove them as contacts.

Loop8's zero-knowledge architecture ensures all your credentials, notes, and sensitive information remain exclusively on your device and your chosen personal cloud storage (iCloud or Gmail). Unlike traditional solutions, Loop8 never sees, stores, or has access to your data, eliminating the possibility of hacking.

No, and that's by design. Loop8 employs true zero-knowledge architecture, meaning we literally cannot access your information under any circumstances. Instead, you control recovery through your selected Tru8 contacts, putting security decisions entirely in your hands rather than relying on corporate processes.

Loop8 collects only the absolute minimum information needed to provide service—just your phone number and email address. This minimalist approach aligns with our core philosophy that users should control their own digital information. We never track your usage, monitor your data, or collect any information beyond what's necessary for basic account functions.