FAQ Hub

Practical, plain-English answers on anonymity, document safety, and secure sharing. This is general information, not legal advice.

All questions

Account And Privacy
Reviewed 2026-02-20

How do recovery codes work?

Recovery codes are one-time backup credentials shown once; you store them safely and use one if you lose your passkey device.

Account And Privacy
Reviewed 2026-02-20

What data do you store for accounts?

Account storage is minimal and focused on passkeys, recovery code hashes, plan status, and required billing references.

Anonymity Basics
Reviewed 2026-02-20

Can any tool guarantee anonymity?

No. Good tools reduce risk, but anonymity can still fail through device monitoring, network logs, account links, and document content.

Anonymity Basics
Reviewed 2026-02-20

What is a threat model?

A threat model is a simple map of who might identify you, what data they can access, and which mistakes would expose you.

Anonymity Basics
Reviewed 2026-02-20

What is anonymous document sharing?

Anonymous document sharing means reducing the links between you, your device, your network, and the file so identification becomes harder.

Device Opsec
Reviewed 2026-02-20

Should I use a work device for sensitive documents?

Usually no. Work-managed devices can be monitored, logged, backed up, and audited by your organization.

Legal And Risk
Reviewed 2026-02-20

Is this legal advice?

No. PDF Changer content is general security information and cannot replace legal advice tailored to your jurisdiction and situation.

Legal And Risk
Reviewed 2026-02-20

What if I am under immediate risk?

Prioritize personal safety first, pause non-essential actions, and seek qualified legal or emergency support before continuing.

Metadata
Reviewed 2026-02-20

Can you remove names inside the document content?

Not automatically. Metadata scrubbing does not remove names, signatures, logos, or IDs visible on the page.

Metadata
Reviewed 2026-02-20

Does scrubbing remove EXIF from images?

Not guaranteed. EXIF may remain in embedded images, so high-risk cases should treat image metadata as potentially present.

Metadata
Reviewed 2026-02-20

What does PDF Changer remove?

PDF Changer removes common document metadata, XMP, actions, forms, annotations, and attachments, then rebuilds the output PDF.

Metadata
Reviewed 2026-02-20

What metadata does a PDF carry?

PDFs can include document properties, XMP blocks, timestamps, form data, annotations, and embedded attachments.

Network Opsec
Reviewed 2026-02-20

Does a VPN make me anonymous?

No. A VPN can hide traffic from local networks, but it does not erase account, device, timing, or content-based identifiers.

Network Opsec
Reviewed 2026-02-20

Should I use Tor for submissions?

Tor can reduce network linkability in some scenarios, but it adds complexity and should be used only if you can follow trusted guidance carefully.

Submission Safety
Reviewed 2026-02-20

How do I share documents with journalists safely?

Use official secure intake channels, send sanitized files, and avoid unnecessary personal context in your first message.

Tool Usage
Reviewed 2026-02-20

Can I use PDF Changer offline?

Yes, after first load. The PWA can run scrubber flows offline within local usage limits.

Tool Usage
Reviewed 2026-02-20

How do I scrub a PDF safely?

Use a short repeatable workflow: scrub locally, read the report, inspect the output, and only share the sanitized copy.

Tool Usage
Reviewed 2026-02-20

Why are links, forms, and comments removed?

They are removed because annotations and forms can carry actions, scripts, and hidden data that increase risk.