Our Privacy Commitment
You Own Your Data, We’re Just Borrowing It
Full Transparency
User Control
Fair Compensation
Security Architecture
Enterprise-Grade Protection
Multi-Layer Security Model
- Collection Layer
- Transport Layer
- Storage Layer
- Processing Layer
Secure Data Capture
Browser Extension Security:- Runs in an isolated sandbox environment
- No access to other extensions or tabs
- Encrypted data transmission
- Local anonymization before sending
- SSL/TLS encryption for all transfers
- Certificate pinning to prevent MITM attacks
- Data compression and obfuscation
What We Collect vs What We Don’t
Complete Transparency
✅ What We Collect
✅ What We Collect
- Click coordinates and targets
- Page navigation sequences
- Form field interactions (not content)
- Scroll patterns
- Time spent on tasks
- Page URLs (excluding parameters)
- DOM structure
- Screenshot regions (anonymized)
- Browser viewport size
- General geographic region (country)
- Page load times
- Action success/failure
- Network request metadata
- Error states
❌ What We Never Collect
❌ What We Never Collect
- Passwords or login credentials
- Credit card or payment details
- Social Security numbers
- Personal health information
- Private messages or emails
- Form input values (only structure)
- File contents
- Clipboard data
- Camera or microphone access
- Location beyond country level
- Installed software list
- File system contents
- Other browser data
- Cookies or session data
- Hardware identifiers
Automatic Privacy Protection
Smart Exclusions
Protected Categories
| Category | Examples | Protection Level |
|---|---|---|
| Financial | Banks, payment processors, crypto exchanges | Complete exclusion |
| Healthcare | Patient portals, insurance, medical sites | Complete exclusion |
| Government | Tax sites, DMV, benefits portals | Complete exclusion |
| Authentication | Password managers, 2FA apps | Complete exclusion |
| Adult Content | Automatically detected and excluded | Complete exclusion |
| Private Browsing | Incognito/Private mode | Never recorded |
User Control Features
You’re in Charge
Pause Anytime
Custom Block Lists
Selective Sharing
Data Deletion
Export Your Data
Earnings Transparency
Data Anonymization
Privacy-Preserving Techniques
Anonymization Pipeline
Stage 1: Collection
- Remove personal identifiers
- Strip URL parameters
- Blur sensitive regions
- Hash user sessions
Stage 2: Processing
- Aggregate similar actions
- Add statistical noise
- Generalize specifics
- Remove outliers
Stage 3: Storage
- Separate data from identity
- Distribute across servers
- Encrypt all records
- Regular data rotation
Stage 4: Training
- Batch processing only
- No individual tracking
- Differential privacy
- Secure aggregation
Compliance & Regulations
Meeting Global Standards
- GDPR Compliance
- CCPA Compliance
- Global Standards
European Standards
Your Rights Under GDPR:- Right to access your data
- Right to rectification
- Right to erasure (“right to be forgotten”)
- Right to data portability
- Right to object to processing
- Right to restriction of processing
- Privacy by design and default
- Data minimization
- Purpose limitation
- Lawful basis for processing
- Data protection officer appointed
Data Governance
Community-Owned, Community-Governed
Governance Structure
Privacy Committee
Privacy Committee
Transparency Reports
Transparency Reports
Community Audits
Community Audits
Open Development
Open Development
Security Measures
Protecting Your Contribution
Infrastructure Security
- Enterprise-grade cloud infrastructure
- Geographic redundancy
- 24/7 monitoring
- Physical security controls
- Disaster recovery protocols
Application Security
- Regular security updates
- Vulnerability scanning
- Code signing
- Secure development lifecycle
- Bug bounty program
Access Control
- Multi-factor authentication
- Biometric options
- Session management
- IP allowlisting
- Anomaly detection
Incident Response
- 24/7 security monitoring
- Automated threat detection
- Documented incident response procedures
- User notification protocols
- Recovery and remediation plans
Privacy Tools
Take Control
Privacy Dashboard
Data Inspector
Block List Manager
Consent Center
Trust & Transparency
Our Open Commitment
Transparency Initiatives
| Initiative | Description | Frequency |
|---|---|---|
| Public Audits | Third-party security audits published in full | Annual |
| Transparency Reports | Data requests, collection stats, incidents | Quarterly |
| Privacy Changelog | Every privacy policy or practice change | Real-time |
| Community Q&A | Direct answers to privacy questions | Monthly |
| Open Source Tools | Privacy and security tools available on GitHub | Ongoing |
Frequently Asked Questions
How is this different from Google or Meta collecting my data?
How is this different from Google or Meta collecting my data?
What exactly happens when I browse with the extension running?
What exactly happens when I browse with the extension running?
If I accidentally visit something I don't want recorded, what do I do?
If I accidentally visit something I don't want recorded, what do I do?
How does automatic site exclusion actually work?
How does automatic site exclusion actually work?
Can anyone identify me from my training data?
Can anyone identify me from my training data?
Does contributing more data mean sacrificing more privacy?
Does contributing more data mean sacrificing more privacy?
How do you track my earnings without tracking me personally?
How do you track my earnings without tracking me personally?
What stops Action Model from becoming just another Big Tech data harvester?
What stops Action Model from becoming just another Big Tech data harvester?
Can I use this with VPN, ad blockers, and other privacy tools?
Can I use this with VPN, ad blockers, and other privacy tools?
What happens if there's a data breach?
What happens if there's a data breach?
Can I see what data was collected before it's sent for training?
Can I see what data was collected before it's sent for training?
Can I use this on my work computer without my employer seeing my personal browsing?
Can I use this on my work computer without my employer seeing my personal browsing?
Does incognito/private browsing mode get recorded?
Does incognito/private browsing mode get recorded?
Who actually has access to the raw training data?
Who actually has access to the raw training data?
How can I verify you're actually keeping these promises?
How can I verify you're actually keeping these promises?
Security Resources
Privacy Policy
Chrome Privacy
Report an Issue
Your privacy isn’t a feature. It’s a fundamental right. We protect it. You control it. Together, we own the future.