before our analysts can decode your de43 bitstream, you must provide the correct raw data. this guide will walk you through the exact extraction protocol.
modern banking apps use "friendly labels" — simplified, marketing-approved names for merchants. these labels actively redact the raw iso-8583 data that our forensic engine requires.
for example, your app might show "microsoft" while the actual field 43 bitstream reads msbill.info*msft. the app's sanitized version is useless for forensic tracing. you need the raw string.
open your official pdf bank statement. look for the transaction listing table. the column labeled "description" (or sometimes "transaction details") contains the raw de43 bitstream.
this is where you will find strings like msbill.info, amzn mktp us, or chase recurring pymt. these are the exact bitstream artifacts our engine requires.
// locate this row in your pdf statement:
date: 01/15/2026 | description: msbill.info*msft 800... | amount: $9.99
// ↑ the "description" field is your de43 bitstream.
// send us this exact string. do not paraphrase.
before transmitting any statement data to our forensic intake, you must digitally redact the following personally identifiable information (pii):
once you have located your raw de43 descriptor and redacted all pii, use the secure channel below to transmit your data to our forensic intake.
zero-knowledge compliant. iso 27001 standards. no bank credentials required.