Back to workflows

Username

Check a username without turning it into identity proof.

A careful workflow for reading public username traces without targeting a person.

Goal

Treat a repeated username as a weak lead, not as proof of identity.

Best for

Owned-account checks, brand protection, open-profile context, and training.

Inputs

Username, Platform, Public profile URL

Steps

01

Define scope

Write why the username is being checked and which platforms are in scope.

Check: The purpose is legitimate and limited.

02

List public profiles

Record only openly visible profiles with source, platform, and date.

Check: No private or login-gated area is used.

03

Compare weak signals

Look at public links, dates, themes, and profile context.

Check: The note uses lead language, not identity language.

04

Keep uncertainty

If the match is weak, label it unverified or possible.

Check: The result does not expose or target a person.

Output

Open profile list, confidence note, and unverified match limits.

Report line

The same username appears in open sources, but this does not prove that the accounts belong to the same person.