Interesting idea. I have to fork over a bunch of very sensitive information so you can search through data leaks for it? If so, I'd think you would become a big target to be hacked yourself.<p>Additionally, if you're digging through leaked/hacked/stolen data, you by definition have to possess it. I wonder what the legality of possessing that data is, let alone selling indirect access to it?