Privacy violations,
uncovered at scale.
We deploy mass automated scanning and behavioral analysis across thousands of apps and websites to identify systemic privacy violations. We believe privacy is a fundamental right— and by providing class action firms with the empirical data needed to hold violators accountable—that right can be made a reality.
Live Scan Intelligence
Sites where users said no —
and got tracked anyway.
Violation
Meta Pixel Fired After Opt-Out
What We Found
User clicked "Reject All" on the consent banner. Meta Pixel continued sending browsing and shopping activity to Facebook — including the user's identity — after the opt-out was confirmed.
Scope
Documented across 280+ retail sites
Violation
TikTok Pixel Ignored Global Privacy Control
What We Found
The site received and acknowledged the user's Global Privacy Control opt-out signal. TikTok Pixel kept sending purchase and cart activity to TikTok regardless.
Scope
Documented across 140+ retail sites
Violation
Attentive Collected Contact Info After Opt-Out
What We Found
After the user rejected tracking, email and phone number entered at checkout were sent to Attentive and added to a retargeting list — despite the active opt-out.
Scope
Documented across 90+ retail sites
How We Build the Dataset
Every target is verified. Every violation is documented.
We focus on established, high-traffic U.S. websites with real user bases, active consent mechanisms, and meaningful exposure under California and federal law. Targets are evaluated not just for the presence of a violation — but for the profile of a case that moves.
Our scanner visits each site as a real user would, explicitly rejects tracking through the consent banner or Global Privacy Control signal, then monitors every network request that follows. We flag any site that sends data to an ad network after a clear opt-out.
Our proprietary database indexes hundreds of civil class action complaints and motion-to-dismiss decisions under the federal Wiretap Act, CIPA §631, and related statutes. Every target profile we pursue has been cross-referenced against the factual and legal patterns that courts have allowed to proceed — and those that have not.
We find the violations. You file the cases.
Each target in our dataset comes with timestamped network evidence of post-rejection tracker activity, jurisdiction confirmation, and where applicable — documented personal data transmission to named ad networks. Ready to support standing, class certification, and per-violation damages calculations.