Your Password Manager Is Leaking More Than You Think
We ran network capture analysis on seven leading password managers. Three sent data to third-party analytics services under conditions their privacy policies did not clearly disclose.
Technical deep dives into privacy policies and data practices
Privacy policies are written by lawyers for regulators, not users. We translate them into plain English, run network analysis on what software actually sends, and compare stated policies against technical reality. Every instalment includes our full methodology and the opportunity for companies to respond before publication.
We ran network capture analysis on seven leading password managers. Three sent data to third-party analytics services under conditions their privacy policies did not clearly disclose.
Do Not Track headers have been ignored for years. We documented exactly how 20 major platforms respond, or fail to respond, to every current browser privacy signal.
Twelve consumer VPN services make strong no-log promises. We tested network behaviour under controlled conditions. Four failed their own stated policies.
Health data is the most sensitive category of personal information. We examined ten leading health and fitness apps against every privacy regime in which they operate.
+7 more articles in this series. Subscribe to the newsletter to receive every new instalment.
Every new article in Privacy Under the Microscope goes straight into the weekly newsletter. No separate subscription required.
No spam. No affiliate links. Just honest analysis. Unsubscribe any time.