Skip to main content
Privacy by Design: Unlike Big Tech companies that harvest your data in the shadows, Action Model operates with complete transparency. You know what we collect, why we collect it, and you’re rewarded for every contribution. This is how data sharing should work.

Our Privacy Commitment

You Own Your Data, We’re Just Borrowing It

Full Transparency

Every piece of data collected is documented. No hidden tracking, no surprise collection, no dark patterns.

User Control

Pause, delete, or export your data anytime. Add sites to block lists. You have complete control.

Fair Compensation

Unlike others who profit from your data, we reward you with tokens that represent actual ownership.

Security Architecture

Enterprise-Grade Protection

Multi-Layer Security: Your data is protected by industry-standard encryption and security practices at every stage, from collection through storage to processing.

Multi-Layer Security Model

  • Collection Layer
  • Transport Layer
  • Storage Layer
  • Processing Layer

Secure Data Capture

Browser Extension Security:
  • Runs in an isolated sandbox environment
  • No access to other extensions or tabs
  • Encrypted data transmission
  • Local anonymization before sending
Protection Measures:
  • SSL/TLS encryption for all transfers
  • Certificate pinning to prevent MITM attacks
  • Data compression and obfuscation

What We Collect vs What We Don’t

Complete Transparency

Interaction Data:
  • Click coordinates and targets
  • Page navigation sequences
  • Form field interactions (not content)
  • Scroll patterns
  • Time spent on tasks
Environmental Context:
  • Page URLs (excluding parameters)
  • DOM structure
  • Screenshot regions (anonymized)
  • Browser viewport size
  • General geographic region (country)
Performance Metrics:
  • Page load times
  • Action success/failure
  • Network request metadata
  • Error states
Personal Information:
  • Passwords or login credentials
  • Credit card or payment details
  • Social Security numbers
  • Personal health information
  • Private messages or emails
Sensitive Content:
  • Form input values (only structure)
  • File contents
  • Clipboard data
  • Camera or microphone access
  • Location beyond country level
System Information:
  • Installed software list
  • File system contents
  • Other browser data
  • Cookies or session data
  • Hardware identifiers

Automatic Privacy Protection

Smart Exclusions

Zero-Touch Security: Sensitive sites are automatically excluded without any action required from you. Banking, healthcare, and government sites are never recorded.

Protected Categories

CategoryExamplesProtection Level
FinancialBanks, payment processors, crypto exchangesComplete exclusion
HealthcarePatient portals, insurance, medical sitesComplete exclusion
GovernmentTax sites, DMV, benefits portalsComplete exclusion
AuthenticationPassword managers, 2FA appsComplete exclusion
Adult ContentAutomatically detected and excludedComplete exclusion
Private BrowsingIncognito/Private modeNever recorded

User Control Features

You’re in Charge

1

Pause Anytime

One click to pause all recording. Set schedules for automatic pausing during work hours or specific times.
2

Custom Block Lists

Add any website to your personal block list. These sites will never be recorded, no questions asked.
3

Selective Sharing

Choose which types of data to share. Want to exclude screenshots? Forms? Network requests? You decide.
4

Data Deletion

Request complete deletion of your data at any time. We’ll remove it from all systems within 72 hours.
5

Export Your Data

Download all your contributed data in standard formats. It’s yours, take it whenever you want.
6

Earnings Transparency

See exactly what data earned you tokens and why. Complete transparency in the reward system.

Data Anonymization

Privacy-Preserving Techniques

K-Anonymity: Your data is aggregated with many other users’ data before processing, making individual identification impossible.

Anonymization Pipeline

Stage 1: Collection

  • Remove personal identifiers
  • Strip URL parameters
  • Blur sensitive regions
  • Hash user sessions

Stage 2: Processing

  • Aggregate similar actions
  • Add statistical noise
  • Generalize specifics
  • Remove outliers

Stage 3: Storage

  • Separate data from identity
  • Distribute across servers
  • Encrypt all records
  • Regular data rotation

Stage 4: Training

  • Batch processing only
  • No individual tracking
  • Differential privacy
  • Secure aggregation

Compliance & Regulations

Meeting Global Standards

  • GDPR Compliance
  • CCPA Compliance
  • Global Standards

European Standards

Your Rights Under GDPR:
  • Right to access your data
  • Right to rectification
  • Right to erasure (“right to be forgotten”)
  • Right to data portability
  • Right to object to processing
  • Right to restriction of processing
Our Compliance:
  • Privacy by design and default
  • Data minimization
  • Purpose limitation
  • Lawful basis for processing
  • Data protection officer appointed

Data Governance

Community-Owned, Community-Governed

DAO Oversight: Major privacy decisions are voted on by token holders. This isn’t corporate privacy theater, it’s community-controlled data governance.

Governance Structure

Elected community members who oversee privacy practices, review policies, and ensure compliance with our commitments.
Quarterly reports detailing data collected, requests received, actions taken, and any privacy incidents.
Token holders can propose and vote on independent privacy audits to verify our practices.
Our privacy tools and anonymization algorithms are open-source for community review and improvement.

Security Measures

Protecting Your Contribution

Infrastructure Security

Data Centers:
  • Enterprise-grade cloud infrastructure
  • Geographic redundancy
  • 24/7 monitoring
  • Physical security controls
  • Disaster recovery protocols

Application Security

Software Protection:
  • Regular security updates
  • Vulnerability scanning
  • Code signing
  • Secure development lifecycle
  • Bug bounty program

Access Control

Authentication:
  • Multi-factor authentication
  • Biometric options
  • Session management
  • IP allowlisting
  • Anomaly detection

Incident Response

Incident Response:
  • 24/7 security monitoring
  • Automated threat detection
  • Documented incident response procedures
  • User notification protocols
  • Recovery and remediation plans

Privacy Tools

Take Control

1

Privacy Dashboard

Access your personal privacy dashboard to view all collected data, manage settings, and control sharing preferences.
2

Data Inspector

See exactly what data was collected from each session, with the ability to delete specific recordings.
3

Block List Manager

Easily add, remove, and manage websites on your personal block list with wildcard support.
4

Consent Center

Granular control over what types of data you share, with easy toggle switches for each category.

Trust & Transparency

Our Open Commitment

Radical Transparency: We publish everything, from privacy policy changes to security incidents to data request statistics. No corporate PR spin, just facts.

Transparency Initiatives

InitiativeDescriptionFrequency
Public AuditsThird-party security audits published in fullAnnual
Transparency ReportsData requests, collection stats, incidentsQuarterly
Privacy ChangelogEvery privacy policy or practice changeReal-time
Community Q&ADirect answers to privacy questionsMonthly
Open Source ToolsPrivacy and security tools available on GitHubOngoing

Frequently Asked Questions

Three fundamental differences: (1) Transparency - You see exactly what’s collected and why. No hidden tracking or dark patterns. (2) Compensation - You earn tokens that represent real ownership, not just “personalized ads.” (3) Control - Pause anytime, delete anything, block any site. With Big Tech, you’re the product. With Action Model, you’re an owner.
The extension records your interactions (clicks, navigation, scrolling) on sites that aren’t automatically excluded. Before sending anything, it removes personal identifiers and anonymizes the data locally on your device. You can review what was captured in your dashboard and delete any session before it’s used for training. Banking, healthcare, government sites, and private browsing are never recorded.
Three options: (1) Add the site to your block list immediately - the extension will stop recording and won’t send that session. (2) Delete the specific session from your dashboard before it’s submitted. (3) Use the pause button before visiting sensitive sites. We also have smart detection that automatically excludes financial, healthcare, and other sensitive sites.
The extension maintains an encrypted list of patterns for sensitive sites (banking domains, healthcare portals, government sites, password managers, etc.). Before recording anything, it checks the URL against this list. If there’s a match, recording is disabled for that tab. The list is updated regularly and you can add your own patterns to your personal block list.
No. Your data goes through a 4-stage anonymization pipeline: (1) Personal identifiers are removed on your device before sending. (2) Server-side processing strips additional metadata and adds statistical noise. (3) Your data is aggregated with other users (k-anonymity). (4) The LAM only trains on aggregated patterns, never individual sessions. No one can trace anonymized data back to individual contributors.
Not necessarily. You control what types of data you share. You can contribute navigation patterns without screenshots, or exclude form interactions while sharing clicks. More contribution does earn more tokens, but the anonymization process is the same regardless of volume. Quality diverse data from your normal browsing is often more valuable than high-volume generic data.
Your wallet address is cryptographically separated from your training data. When you contribute, the system generates a hash that proves you contributed without revealing what you contributed. Your earnings are calculated based on data quality metrics (diversity, usefulness, error rate), not personal tracking. We verify your contribution without monitoring your browsing behavior.
(1) Community governance - Major privacy decisions require token holder votes. (2) Open source - Anonymization algorithms and privacy tools are publicly auditable. (3) Economic alignment - We make money when the LAM performs well, not when we sell your data. (4) Transparency reports - Quarterly disclosures of all data practices, requests, and incidents. (5) Legal structure - The foundation is community-owned, not venture-backed with extraction incentives.
Yes. The extension works alongside VPNs, ad blockers (uBlock, Privacy Badger, etc.), tracker blockers, and privacy-focused browsers. We encourage layered privacy. The only thing that might reduce earnings is if privacy tools block sites that would provide valuable training data, but your privacy always comes first.
(1) Immediate notification to all affected users within 24 hours. (2) Anonymized data cannot be traced back to individuals. (3) No passwords, payment information, or credentials are stored. (4) Full transparency reports detailing what happened, what was exposed, and remediation steps. (5) Community governance will determine appropriate response and potential compensation.
Yes. The dashboard’s Data Inspector shows every session captured, including timestamps, sites visited (domains only), and data types collected. You can review, download, or delete any session before it’s submitted for training. Once you approve a session, it enters the anonymization pipeline within 24 hours.
Your data is anonymized before leaving your device - your employer can’t intercept identifiable browsing data. However, like any browser extension, your IT admin can see you have it installed. If you’re using a work computer for personal browsing, use a separate browser profile with the extension only on your personal profile, or pause the extension during work hours using the schedule feature.
No, never. The extension automatically disables in all private/incognito browsing modes. If you want to browse without contributing training data but stay in normal mode, use the pause button or set a schedule.
Nobody has access to raw, individual user data. Here’s the access hierarchy: (1) You - See your own data before anonymization. (2) Automated systems - Process and anonymize data, no human access. (3) Data scientists - Only see aggregated, fully anonymized training sets. (4) Community - Can audit statistical reports and anonymization algorithms. No employee, founder, or administrator can view your specific browsing sessions.
(1) Open source tools - Review anonymization code on GitHub. (2) Third-party audits - Annual security audits published in full. (3) Transparency reports - Quarterly statistics on data collection and requests. (4) Community audits - Token holders can vote to commission independent reviews. (5) Your own data - Export everything and verify what we have. (6) Bug bounty - Report violations for rewards.

Security Resources


Your privacy isn’t a feature. It’s a fundamental right. We protect it. You control it. Together, we own the future.