What is Privacy Audit?
A comprehensive assessment of your digital privacy posture, examining browser exposure, website security, email configuration, data broker presence, and overall threat model.
A privacy audit answers the question: "How exposed am I, and what should I do about it?"
What a Privacy Audit Covers
- Browser exposure: What does your browser reveal to every website you visit? (IP address, fingerprint, WebRTC leaks, device info)
- Website security: If you run a website, what trackers, cookies, and security headers are in place?
- Email security: Are your domain's SPF, DKIM, and DMARC records properly configured?
- Data broker presence: Is your personal information listed on people search sites?
- Password security: Are your passwords strong enough? Have they appeared in breaches?
- DNS leaks: Is your VPN actually protecting your DNS queries?
- Threat model: Based on your situation, what are the most important threats to address?
How to Conduct One
You can audit yourself using free tools:
- Check browser exposure at /exposed
- Scan your website at /scanner
- Test your passwords at /password-check
- Check email security (included in /audit)
- Test for DNS leaks (included in /exposed)
- Check domain WHOIS privacy (included in /audit)
- Strip metadata from photos at /metadata
Taking Action
The audit identifies problems. The action plan fixes them — prioritized by severity and your specific threat model. A comprehensive audit with an AI-generated action plan turns findings into a step-by-step remediation roadmap.
Related Terms
Browser Fingerprinting
A tracking technique that collects information about your browser, device, and settings to create a unique identifier. Unlike cookies, fingerprints are nearly impossible to delete and can track you across websites without your knowledge or consent.
Digital Footprint
The trail of data you leave behind when using the internet — every search, click, post, purchase, and login creates a record that can be collected and analyzed.
Threat Modeling
The systematic process of identifying potential threats, vulnerabilities, and attack vectors to determine appropriate security and privacy measures.
Have more questions?
Use our guided flow to get the right next privacy step for Privacy Audit.
Open Guided Flow