FAQ Hub
Practical, plain-English answers on anonymity, document safety, and secure sharing. This is general information, not legal advice.
All questions
How do recovery codes work?
Recovery codes are one-time backup credentials shown once; you store them safely and use one if you lose your passkey device.
What data do you store for accounts?
Account storage is minimal and focused on passkeys, recovery code hashes, plan status, and required billing references.
Can any tool guarantee anonymity?
No. Good tools reduce risk, but anonymity can still fail through device monitoring, network logs, account links, and document content.
What is a threat model?
A threat model is a simple map of who might identify you, what data they can access, and which mistakes would expose you.
What is anonymous document sharing?
Anonymous document sharing means reducing the links between you, your device, your network, and the file so identification becomes harder.
Should I use a work device for sensitive documents?
Usually no. Work-managed devices can be monitored, logged, backed up, and audited by your organization.
Is this legal advice?
No. PDF Changer content is general security information and cannot replace legal advice tailored to your jurisdiction and situation.
What if I am under immediate risk?
Prioritize personal safety first, pause non-essential actions, and seek qualified legal or emergency support before continuing.
Can you remove names inside the document content?
Not automatically. Metadata scrubbing does not remove names, signatures, logos, or IDs visible on the page.
Does scrubbing remove EXIF from images?
Not guaranteed. EXIF may remain in embedded images, so high-risk cases should treat image metadata as potentially present.
What does PDF Changer remove?
PDF Changer removes common document metadata, XMP, actions, forms, annotations, and attachments, then rebuilds the output PDF.
What metadata does a PDF carry?
PDFs can include document properties, XMP blocks, timestamps, form data, annotations, and embedded attachments.
Does a VPN make me anonymous?
No. A VPN can hide traffic from local networks, but it does not erase account, device, timing, or content-based identifiers.
Should I use Tor for submissions?
Tor can reduce network linkability in some scenarios, but it adds complexity and should be used only if you can follow trusted guidance carefully.
How do I share documents with journalists safely?
Use official secure intake channels, send sanitized files, and avoid unnecessary personal context in your first message.
Can I use PDF Changer offline?
Yes, after first load. The PWA can run scrubber flows offline within local usage limits.
How do I scrub a PDF safely?
Use a short repeatable workflow: scrub locally, read the report, inspect the output, and only share the sanitized copy.
Why are links, forms, and comments removed?
They are removed because annotations and forms can carry actions, scripts, and hidden data that increase risk.