What software really does

Every finding proven by binary decompilation — not privacy policies, not marketing claims, not trust scores. Actual code.

2
Software Analyzed
24,743
Functions Decompiled
32
Findings Proven
11
Critical Findings

Recent Reports

How We Know

1

Decompile

We reverse-engineer the actual binary. Every function, every string, every network call — extracted from the executable itself.

2

Analyze

We trace data flows from collection to transmission. Hardware fingerprints, analytics payloads, telemetry endpoints — all documented with code evidence.

3

Grade

Each product gets an A-F grade based on consent, data minimization, transparency, security, and policy adherence. The rubric is public and reproducible.