How do you protect your organization's private information?

EchoMark was established to tackle the growing problem of private information leaks.

By personalizing content with multiple types of invisible marks, EchoMark helps foster a sense of responsibility among recipients of private information. Integrate EchoMark with your Exchange and Google Workspace accounts, ensuring uninterrupted content sharing without any user intervention.

Our mission is to unlock the freedom to communicate and collaborate without sacrificing security.
Our solution empowers teams to share information critical to their success, while enabling companies to maintain trust and prevent damage to their organization.

Protect your private information and investigate leaks with EchoMark

When information that has been protected by EchoMark leaks outside of its intended audience, EchoMark gives you the tools to quickly find the source of a leak. Our tool provides a detailed report when you upload a leaked document or even a photo or snapshot of a leaked message. Connect with us to see how EchoMark can protect your private information.

Talk with us
A screen shot of a leak report from the EchoMark App

What is a leak report?

After running a leak investigation in EchoMark, you'll be presented with a leak report. The leak report gives high-level match result as well as detailing the results of each detector that was run against the leaked artifact. Each leak report is a little different based on the form the leak came in, so your leak reports might look different. Keep reading for a complete breakdown of the leak report.

The result summary

The outcome of the leak analysis is summarized hereas a quick reference.

A screenshot of the top of a Leak Report. First line reads "Exact Match" in blue, second line reads "," last line reads "Based on: Digital stamp, Invisible watermark"

Digital stamp detector results

The digital stamp is an unguessable key embedded within the metadata of the marked file. If the marked file leaks and the file has not been tampered with, this detector should be able to find a match with very high confidence.

Screenshot of Digital Stamp detector. Shows a chance of error of 0% and a Result: ""

Invisible watermark detector results

Our technology finds the formatting marks that EchoMark embedded in the content using either text detection or computer vision for images. The invisible watermark detector compares the marks it finds to the marks in each marked version of the content to find the best match.

Screenshot of the Invisible Watermark detectors. Shows a chance of error of "<0.0001%" and a horizontal bar graph of results with matching marks on the x axis. Top bar graph result is ""

The matching marks are shown in a bar graph to the right of the chance of error and possibility of impersonation.

The chance of error is a measure of detector reliability for the artifact type submitted based on experimental tests. If the chance of error is listed at 0%, it means that there is less than one in a trillion chance of error.

Depending on the image quality, EchoMark's computer vision may not be able to detect all embedded marks - if there are too few found, EchoMark returns a "no match" or "inconclusive."Our team can still often help you refine the investigation in these cases.

Phrasing detector results

If AI rephrasing was used in your marked copy, EchoMark will analyze the phrases to determine which marked copy contains the specific combination of phrasings contained in the leak. If few phrases are marked, it's possible that this detector will return multiple, high-confidence results that all contain the phrases used in the leak. In these cases, the Invisible watermark detector can help further identify the leak source.

Screenshot of the Phrasing detector. Shows a chance of error of "<0.0001%" and a horizontal bar graph of results with matching marks on the x axis. Top bar graph result is ""

Leaked file metadata

Information about the leaked file used for the investigation is displayed here at the end of the report. This information can help with debugging inconclusive matches.

Screenshot of leaked file metadata. Shows filename, "Leak.pdf," Create date and the Content creator for the file

Original file metadata

This indicates the user-selected original file that was compared against for the leak investigation.

Screenshot of the Original file metadata. Shows a filename, create date, which message the file was attached to and how many marked copies were created of that original.

Result types

Your results will vary depending on the quality and type of artifact that you used to run a leak investigation. At a high level there are only three types of Leak Report Outcomes.

Exact match

Exact matches are found if the leaked artifact is a marked file with the Digital Stamp intact. In the case of an exact match, EchoMark is 100% confident that the leaked file matches a particular marked copy because it means that the detector was able to find our unguessable forensic key.

High confidence match

High confidence matches occur when an artifact is uploaded for the leak investigation and our detection system finds that it matches a marked copy with a very high level of precision and accuracy.


Sometimes our computer vision detection system is not confident in determining a clear match. This might be due to a low quality image or one that is too skewed or distorted. In those cases, you can reach out to our support team and we'll help you narrow down the hunt.

Collaborate and communicate freely — without sacrificing security.

See how EchoMark can remove barriers to sharing while still protecting your most private information.

Contact Us

Interested in a product demo or ready to join the private beta? Tell us a little about yourself and we’ll get back to you soon.