Custodire — return to home

Leave a secure contact address. We will respond within one working day via encrypted channel.

Secure inquiry

This form does not collect metadata. No analytics or tracking scripts are present on this page.

How should we contact you securely?

Received. A response will follow within one working day.
Submission could not be processed. Please contact secure@custodire.ai directly.

Secure enquiry

No analytics. No tracking. No metadata profiling.

How to engage

Custodire operates exclusively by retainer and referral. Every engagement begins under NDA. There is no public onboarding pathway.

01 Secure enquiry

Use the form on this page or write to secure@custodire.ai. Do not include principal names, case details, or identifying information in your first message. We will establish a secure channel before any sensitive information is exchanged. No prior secure communications setup is required; if necessary, provide only a contact method and we will take it from there.

OpenPGP

Encrypted email correspondence is supported via OpenPGP. Download our public key below and verify the fingerprint before use.

Download public key (.asc)

If the key opens in your browser, save the file locally before import.

Command line: curl -O https://raw.githubusercontent.com/CUSTODIREAI/pgp/main/pgp/keyring_pub.asc

Fingerprint

C05E 149D 4D8B 4C7B 77D9 5624 8FD6 C628 D25E 2E9A

Copy

Key ID: 8FD6C628D25E2E9A · Algorithm: RSA 4096 · Never expires.

Copy

02 NDA execution

A mutual non-disclosure agreement is executed before any briefing. No exceptions.

03 Threat assessment

Once the NDA is in place, a confidential briefing is conducted with the principal or their designated representative. We assess the threat profile, timeline, distribution footprint, and evidential requirements to determine the appropriate response.

04 Retainer

Custodire operates on retainer. This ensures continuous monitoring, priority response, and standing forensic capability that can be activated without delay. Terms are agreed following assessment.

05 Operational deployment

Monitoring, forensic analysis, removal enforcement, and legal support are deployed in parallel. The principal and their advisers receive secure intelligence reporting throughout. Documentation is maintained to evidential standard.

06 Continuing coverage

Protection is continuous, not episodic. New threat signatures, platform migration, and closed-channel activity are monitored as a standing obligation under retainer.