About Actyra Open

Why This Exists

Privacy policies tell you what companies say they do. We show you what software actually does — proven by decompiling the binary and reading the code.

Existing tools like ToS;DR and PrivacySpy analyze policies. Nobody analyzes the actual executables. Until now.

Methodology

Every report follows the same process:

  1. Obtain the official installer from the vendor's website
  2. Decompile using Ghidra (NSA's open-source reverse engineering tool)
  3. Extract all strings, API calls, network endpoints, and data structures
  4. Trace data flows: what is collected, when, and where it's sent
  5. Compare actual behavior against the vendor's Terms of Service and Privacy Policy
  6. Grade using our public rubric (consent, minimization, transparency, security, policy adherence)
  7. Publish findings with code-level evidence

Grading Rubric

CategoryWeightWhat We Measure
Consent25%Does it collect data before user consent?
Data Minimization20%How much data vs. what's actually needed?
Transparency20%Does the UI disclose what's collected?
Security15%Is collected data encrypted in transit?
Policy Adherence20%Does the binary match the vendor's ToS/Privacy Policy?

A (90-100) | B (80-89) | C (70-79) | D (60-69) | F (0-59)

Access Tiers

Public

Grades, summaries, and finding categories. No account needed.

Researcher

Full reports with code-level evidence, endpoint details, and GDPR analysis. Free account required.

Archive

Raw decompiled source code and Ghidra project files. By request.

API & MCP

All data is available programmatically:

  • REST API at api.actyra.com/api/v1/
  • MCP server for AI agents: @actyra/open-mcp