FAQs
Moving from a master password to biometrics is a major security shift. Here’s how Loop8’s passwordless system protects your data and stands out from traditional security.
Moving from a master password to biometrics is a major security shift. Here’s how Loop8’s passwordless system protects your data and stands out from traditional security.
FAQ
Loop8 is a Personal Privacy Controller that goes beyond password management to provide true identity authentication. Unlike traditional password managers that still rely on vulnerable master passwords, Loop8 uses biometric verification (Face-ID or fingerprints) to eliminate passwords entirely, addressing the root cause of 92% of all hacking attempts.
One Loop8 subscription protects up to 8 users, making it perfect for families and friend groups. This community-based model allows you to elevate everyone's security practices together while each person maintains their own private digital spaces.
Your $8 subscription includes the complete Loop8 security ecosystem: passwordless authentication, MySafe digital safe, Authenticator (Auth) for multi-factor authentication, Privacy-Mate (Privacy-M8) dark web monitoring, Clean-Slate (Clean-SL8) cookie protection, Tech Person support, and the Tru8 connect system—all in one integrated app.
Setting up the Tech Person feature is simple. All you need to do is to send a text. The Tech Person can assist with setup and maintenance while appropriate privacy boundaries remain in place, making advanced security accessible to everyone.
Tru8 puts recovery control entirely in your hands. You select trusted contacts who can verify your identity if needed. If you lose your phone, these contacts receive a verification request. Once confirmed, your data is securely restored to your device. You can change these contacts anytime, and they'll never know if you remove them as contacts.
Loop8's zero-knowledge architecture ensures all your credentials, notes, and sensitive information remain exclusively on your device and your chosen personal cloud storage (iCloud or Gmail). Unlike traditional solutions, Loop8 never sees, stores, or has access to your data, eliminating the possibility of hacking.
No, and that's by design. Loop8 employs true zero-knowledge architecture, meaning we literally cannot access your information under any circumstances. Instead, you control recovery through your selected Tru8 contacts, putting security decisions entirely in your hands rather than relying on corporate processes.
Loop8 collects only the absolute minimum information needed to provide service—just your phone number and email address. This minimalist approach aligns with our core philosophy that users should control their own digital information. We never track your usage, monitor your data, or collect any information beyond what's necessary for basic account functions.
Privacy-Mate (Privacy-M8) is a dark web monitoring feature included in your Loop8 app that constantly watches for threats to your passwords or personal information, sending you immediate alerts if your data is at risk.
When you visit a website that Privacy-Mate (Privacy-M8) has identified as breached, a helpful red alert pops up on your computer while you're on that site, prompting you to change your password right away.
Privacy-Mate (Privacy-M8) works on both Mac and Windows computers to keep your information secure.
No setup needed! Privacy-Mate (Privacy-M8) comes built into Loop8 and works automatically with your Loop8 extension.
Privacy-Mate (Privacy-M8) is included with your Loop8 app, so it shares the same trial period as Loop8.
Yes, Loop8 works seamlessly across your devices. Your data syncs securely through your personal cloud (iCloud or Gmail), never passing through Loop8's servers. This approach ensures your information remains accessible only to you while maintaining convenience across devices.
Loop8 makes transitioning simple. After installation, the app guides you through importing your existing passwords from browsers or other managers. As you log into sites, Loop8 automatically converts your accounts to biometric authentication, gradually eliminating password dependency.