Fracton helps you build fractons of what services know about you, calculate risk scores, check for breaches, and generate legal requests.
Most tools treat you as a data point. Fracton treats you as the owner of your fractons.
Fracton doesn’t scan you. You manually log what you've shared, forcing you to be mindful of your data.
A logistic regression model calculates risk based on data type, sentiment, and breach status.
Real-time queries to HaveIBeenPwned API to check if the services you use have been compromised.
Generate robust GDPR & CCPA email templates to demand deletion, access, or rectification.
Track your exposure by category and prioritize action based on risk distribution.
Create a fracton on the left to begin analyzing your data exposure.
Fracton is a "local-first" application. Your data is stored in your browser's localStorage. We do not have servers, and we never see your data.
We use a CORS proxy to query the public HaveIBeenPwned API. We send only the domain name (e.g., "linkedin.com") to check if it appears in known breach datasets.
Yes. They adhere to the standard formatting for GDPR (Article 17/15) and CCPA requests. However, you must send the email yourself from your own client to verify your identity to the company.