The threat model
Every online payment leaks something.
When you pay a merchant, you hand over a card number, your name, billing address, sometimes email and phone. The merchant stores it. Their processor stores it. Their analytics provider sees it. When they get breached, when a subscription keeps charging, when a CRM stitches your purchases together, you’re the one exposed.
A privacy layer between you and merchants.
Halocard sits between you and every merchant you pay. The merchant gets a card number, a name, and a billing address that you choose. Your bank, your real identity, and your other purchases stay out of their reach. They can’t correlate you across stores. They can’t stitch you into their CRM.
Full control if something goes wrong.
If a merchant gets breached, starts charging without permission, or just feels off, you can lock the card, cancel it, or replace it in seconds. The damage stays contained to that one card. Your other cards, your funding source, and your main account stay untouched.
The Visa and Mastercard reality
There is no such thing as a fully private card.
Visa, Mastercard, and American Express run almost every card transaction in the world. If you want a card that works at merchants, you’re inside their system. PII has to be provided, verified, and retained by financial institutions. Anyone telling you otherwise is either lying or selling you something that won’t work when you try to use it.
The networks see every transaction.
When you pay with any card on the planet, Visa or Mastercard sees the transaction: amount, merchant, date, location. This is true for every cardholder, everywhere. If you participate in the card system, data has to be shared. That’s the price of acceptance at 175 million merchants.
We do everything we can inside the constraints.
We can’t change how the networks work. We can minimise our own position in the chain, mask what merchants see, compartmentalise your spending across cards, refuse to sell or correlate your data, and delete what we’re legally allowed to delete. That’s the best privacy posture available inside a regulated card program. We deliver it.
What we collect
We try not to collect data.
Transaction history is called via Visa’s API, not stored on our servers. KYC details are passed through to our vendor and removed from our server once verification completes. We retain only what’s needed to manage your account: name, phone number, email.
KYC requires six things, and we tried to reduce all of them.
- name
- address
- date of birth
- expected spend
- government ID or SSN
- a selfie
We pushed back heavily on every single one. It turns out the US Customer Identification Program for Banks regulation is extremely clear. To issue a genuine credit card we have to comply with CIP and the full set of banking laws that govern it. The minimum required is exactly what we collect.
Your identity stays with the issuing bank and Visa.
Sumsub verifies your documents and returns a PASS or FAIL token to us. The documents themselves move on to Third National, our card issuer, and Visa, for the regulatory retention periods required of any credit card program. Sumsub is the facilitator. The long-term holders of your identity data are the bank and the network, as required by financial regulation.
Where your data goes
We share data three ways.
- With partners who help us run the service.
- With authorities when legally required.
- With your consent, like when you connect a third-party app.
Nothing else.
Retention is dictated by regulation, not by us.
- Identity data: 5 years from account closure.
- Transactions: 5 years.
- Funding details: 6 years.
- Audit logs: 3 years.
These periods come from financial regulation, not internal preference. We delete what we’re allowed to delete, when we’re allowed to delete it.
The reality of being a regulated MSB.
We’re a licensed Money Services Business (FinCEN BSA ID 31000317046430). Our service runs on a small set of regulated partners: Third National (cards), Rain Products with SSB (banking, FDIC-insured), Coinflow (payments), Sumsub (identity), Twilio (SMS), Supabase (database). We may be compelled to provide data to the US government or Visa at any time for compliance reasons. We push back on overreach. We don’t volunteer your data.
What we can't protect you from
Anonymity.
The Visa network can still see your transactions. We can put a privacy layer between you and your merchants, but we operate inside a regulated payment system. If you need true anonymity, cash and Monero are your only real options. Neither works at most online merchants.
Government compulsion.
If a court order, subpoena, or lawful government request reaches us, we comply with what we’re legally required to. We push back on overreach. We don’t volunteer your data. We can’t refuse a valid legal request.
Partner breaches.
We minimise what each partner sees, but if Sumsub, Rain, Third National, or any of our infrastructure providers gets breached, the data they hold is exposed. We choose partners with strong security posture (SOC 2, FDIC, audited) but no system is impenetrable.
Harden your own posture
Use one card per merchant.
Halocard makes this cheap and fast. Create a dedicated card for each merchant. When one is breached or starts charging without permission, only that card is exposed. The rest stay clean.
Use a privacy-friendly email and phone number.
SimpleLogin, AnonAddy, ProtonMail, or a forwarding service for email. A VoIP or burner number for SMS verification where you can. The less your real contact info is correlated with your spending, the better.
Use tokenised in-person payments.
Apple Pay and Google Pay generate a unique token for each transaction, so the merchant never sees your real card number even when paying in person. Every Halocard works with both. Use them.