Scanning your connection...
Threat Assessment

Build Your Threat Model

Not everyone needs extreme privacy. Everyone should understand their risk.

6 steps · 2 minutes · no data stored
Step 1 of 617% complete

What best describes your situation?

This helps us understand your baseline risk profile.

Business Owner / Entrepreneur
You run a business and want to keep personal info off public records.
Online Merchant / Seller
You sell products or services online and want to accept payments privately.
Content Creator / Influencer
You have a public-facing online presence with followers or subscribers.
Journalist / Activist / Whistleblower
Your work involves exposing information or taking public stances.
Domestic Abuse / Stalking Survivor
You need to keep your location and identity hidden from a specific person.
Public Figure / Executive / Politician
You have significant public visibility or media attention.
Remote Worker / Digital Nomad
You work remotely and may live across multiple jurisdictions.
Parent Protecting Family
You want to minimize your family's digital exposure.
Privacy-Conscious Individual
No specific threat — you just believe in default privacy.

Runs entirely in your browser. No data stored or transmitted.

This is 1 of 6 checks in the full Privacy Audit

Your threat model is the foundation. The full audit combines it with real scans of your website, email, WHOIS, and browser to turn recommendations into one-click fixes. Run all 6 checks at once and get a prioritized action plan with one-click fixes.

Run Full Audit