Skip to main content
Privacy by Design: Unlike Big Tech companies that harvest your data in the shadows, Action Model operates with complete transparency. You know what we collect, why we collect it, and you’re rewarded for every contribution. This is how data sharing should work.

Our Privacy Commitment

You Own Your Data, We’re Just Borrowing It

Full Transparency

Every piece of data collected is documented. No hidden tracking, no surprise collection, no dark patterns.

User Control

Pause, delete, or export your data anytime. Add sites to block lists. You have complete control.

Fair Compensation

Unlike others who profit from your data, we reward you with tokens that represent actual ownership.

Security Architecture

Enterprise-Grade Protection

Multi-Layer Security: Your data is protected by industry-standard encryption and security practices at every stage, from collection through storage to processing.

What We Collect vs What We Don’t

Complete Transparency

Interaction Data:
  • Click coordinates and targets
  • Page navigation sequences
  • Form field interactions (not content)
  • Scroll patterns
  • Time spent on tasks
  • Time spent inbetween actions
Environmental Context:
  • Page URLs (excluding parameters)
  • DOM structure
  • Screenshot regions (mainly buttons and interaction events - all anonymized)
  • Browser viewport size
  • General geographic region (country)
Performance Metrics:
  • Page load times
  • Action success/failure
  • Network request metadata
  • Error states
Personal Information:
  • Passwords or login credentials
  • Credit card or payment details
  • Social Security numbers
  • Personal health information
  • Private messages or emails
Sensitive Content:
  • Form input values
  • File contents
  • Clipboard data
  • Camera or microphone access
  • Location beyond country level

Automatic Privacy Protection

Smart Exclusions

Zero-Touch Security: Most sensitive sites are automatically excluded without any action required from you. Banking, healthcare, and government sites are never recorded.

Protected Categories

CategoryExamplesProtection Level
FinancialBanks, payment processors, crypto exchangesComplete exclusion
HealthcarePatient portals, insurance, medical sitesComplete exclusion
GovernmentTax sites, DMV, benefits portalsComplete exclusion
AuthenticationPassword managers, 2FA appsComplete exclusion
Adult ContentAutomatically detected and excludedComplete exclusion
Private BrowsingIncognito/Private modeUnless you manually override
Review Your Block List: We recommend periodically checking your block list settings to verify which sites are included. You can manually add any additional sites you want excluded, or remove sites if you want to contribute training data from them.

User Control Features

User Control Pn

You’re in Charge

1

Pause Anytime

One click to pause all recording. Set schedules for automatic pausing during work hours or specific times.
2

Custom Block Lists

Add any website to your personal block list. These sites will never be recorded, no questions asked.
3

Data Deletion

Request complete deletion of your data at any time. We’ll remove it from all systems.
4

Export Your Data

Download all your contributed data in standard formats. It’s yours, take it whenever you want.
5

Earnings Transparency

See exactly what data earned you tokens and why. Complete transparency in the reward system.

Data Anonymization

Privacy-Preserving Techniques

K-Anonymity: Your data is aggregated with many other users’ data before processing, making individual identification impossible.K-anonymity works by ensuring that any piece of data you contribute is indistinguishable from at least K-1 other users’ data. For example, if we use k=50, your browsing pattern on a shopping site is grouped with at least 49 other users who performed similar actions. This means even if someone gained access to the training data, they could never pinpoint your specific contribution since it’s mathematically identical to dozens of others. The higher the K value, the stronger the privacy guarantee, and we dynamically adjust this threshold based on the sensitivity of the data type.

Anonymization Pipeline

Stage 1: Collection

  • Remove personal identifiers
  • Strip URL parameters
  • Blur sensitive regions
  • Hash user sessions

Stage 2: Processing

  • Aggregate similar actions
  • Add statistical noise
  • Generalize specifics
  • Remove outliers

Stage 3: Training

  • Batch processing only
  • No individual tracking
  • Differential privacy
  • Secure aggregation

Compliance & Regulations

Meeting Global Standards

European Standards

Our Compliance:
  • Privacy by design and default
  • Data minimization
  • Purpose limitation
  • Lawful basis for processing
  • Data protection officer appointed
Security Practices:
  • Regular third-party security audits
  • Continuous penetration testing
  • Vulnerability disclosure program
  • Security compliance roadmap

Data Governance

Community-Owned, Community-Governed

DAO Oversight: Major privacy decisions will be voted on by token holders. This isn’t corporate privacy theater, it’s community-controlled data governance.

Security Measures

Protecting Your Contribution

Infrastructure Security

Data Centers:
  • Enterprise-grade cloud infrastructure
  • Path towards DePIN infrastructure
  • Geographic redundancy
  • 24/7 monitoring
  • Physical security controls
  • Disaster recovery protocols

Application Security

Software Protection:
  • Regular security updates
  • Vulnerability scanning
  • Code signing
  • Secure development lifecycle
  • Bug bounty program

Access Control

Authentication:
  • Multi-factor authentication
  • Biometric options
  • Session management
  • IP allowlisting
  • Anomaly detection

Incident Response

Incident Response:
  • 24/7 security monitoring
  • Automated threat detection
  • Documented incident response procedures
  • User notification protocols
  • Recovery and remediation plans

Privacy Tools

Privacy Tools Pn

Take Control

1

Privacy Dashboard

Access your personal privacy dashboard to view all collected data, manage settings, and control sharing preferences.
2

Training History

See exactly what data was collected from each session, with the ability to delete specific recordings.
3

Block List Manager

Easily add, remove, and manage websites on your personal block list with wildcard support.

Trust & Transparency

Our Open Commitment

Radical Transparency: We publish everything, from privacy policy changes to security incidents to data request statistics. No corporate PR spin, just facts.This is a community initiative - our goal is the utilise the community to build something amazing, and collectively share in the rewards of that. This makes us responsible for the fair and safe processes to implement the Action Model Ecosystem.

Transparency Initiatives

InitiativeDescriptionFrequency
Public AuditsThird-party security audits published in fullAnnual
Transparency ReportsData requests, collection stats, incidentsQuarterly
Privacy ChangelogEvery privacy policy or practice changeReal-time
Community Q&ADirect answers to privacy questionsYearly

Frequently Asked Questions

Three fundamental differences: (1) Transparency - You see exactly what’s collected and why. No hidden tracking or dark patterns. (2) Compensation - You earn tokens that represent real ownership, not just “personalized ads.” (3) Control - Pause anytime, delete anything, block any site. With Big Tech, you’re the product. With Action Model, you’re an owner.
The extension records your interactions (clicks, navigation, scrolling) on sites that aren’t automatically excluded. Before sending anything, it removes personal identifiers and anonymizes the data locally on your device. You can review what was captured in your dashboard and delete any session before it’s used for training.
Three options: (1) Add the site to your block list immediately. (2) Delete the specific session from your dashboard. (3) Use the pause button before visiting sensitive sites. We also have smart detection that automatically excludes financial, healthcare, and other sensitive sites and/or information.
The extension maintains a list of patterns for sensitive sites (banking domains, healthcare portals, government sites, password managers, etc.) which are included in your Block List. Before recording anything, it checks the URL against this list. If there’s a match, recording is disabled for that tab.
No. Your data goes through an anonymization pipeline: (1) Personal identifiers are removed on your device before sending. (2) Server-side processing strips additional metadata and adds statistical noise. (3) Your data is aggregated with other users (k-anonymity). (4) The LAM only trains on aggregated patterns, never individual sessions. No one can trace anonymized data back to individual contributors.
Not necessarily. You control what types of data you share. You can contribute navigation patterns without screenshots, or exclude form interactions while sharing clicks. More contribution does earn more tokens, but the anonymization process is the same regardless of volume. Quality diverse data from your normal browsing is often more valuable than high-volume generic data.
Yes. The extension works alongside VPNs, ad blockers (uBlock, Privacy Badger, etc.), tracker blockers, and privacy-focused browsers. We encourage layered privacy. The only thing that might reduce earnings is if privacy tools block sites that would provide valuable training data, but your privacy always comes first.
(1) Immediate notification to all affected users within 24 hours. (2) Anonymized data cannot be traced back to individuals. (3) No passwords, payment information, or credentials are stored. (4) Full transparency reports detailing what happened, what was exposed, and remediation steps. (5) Community governance will determine appropriate response and potential compensation.
Yes. The dashboard’s Data Inspector shows every session captured, including timestamps, sites visited (domains), and data types collected. You can review or delete any session before it’s submitted for training.
Your data is anonymized before leaving your device - your employer can’t intercept identifiable browsing data. However, like any browser extension, your IT admin can see you have it installed. If you’re using a work computer for personal browsing, use a separate browser profile with the extension only on your personal profile, or pause the extension during work hours using the schedule feature.
No, never. The extension automatically disables in all private/incognito browsing modes (you can override this if you want). If you want to browse without contributing training data but stay in normal mode, use the pause button or set a schedule.
Nobody has access to raw, individual user data. Here’s the access hierarchy: (1) You - See your own data before anonymization. (2) Automated systems - Process and anonymize data. (3) Data scientists - Only see aggregated, fully anonymized training sets.

Security Resources


Your privacy isn’t a feature. It’s a fundamental right. We protect it. You control it. Together, we own the future.