Privacy First Architecture

Understand and Own Your Data

Fracton helps you build fractons of what services know about you, calculate risk scores, check for breaches, and generate legal requests.

Why Fracton?

Most tools treat you as a data point. Fracton treats you as the owner of your fractons.

Manual Fractons

Fracton doesn’t scan you. You manually log what you've shared, forcing you to be mindful of your data.

Dynamic Risk Scoring

A logistic regression model calculates risk based on data type, sentiment, and breach status.

Breach Intelligence

Real-time queries to HaveIBeenPwned API to check if the services you use have been compromised.

Legal Requests

Generate robust GDPR & CCPA email templates to demand deletion, access, or rectification.

Actionable Intelligence

Privacy Overview

Track your exposure by category and prioritize action based on risk distribution.

Charts update live as you add or edit fractons.

Data Exposure by Category

0 total

Risk Distribution

0 high

Add Fracton

Basics Signals Save

Pick the *dominant* category for scoring, then tag the data types below.

Select any data types involved. This stays local in your browser.

Quick Templates

Your Data Map 0

No Fractons Yet

Create a fracton on the left to begin analyzing your data exposure.

Common Questions

Where is my data stored?

Fracton is a "local-first" application. Your data is stored in your browser's localStorage. We do not have servers, and we never see your data.

How does the breach check work?

We use a CORS proxy to query the public HaveIBeenPwned API. We send only the domain name (e.g., "linkedin.com") to check if it appears in known breach datasets.

Are the legal requests real?

Yes. They adhere to the standard formatting for GDPR (Article 17/15) and CCPA requests. However, you must send the email yourself from your own client to verify your identity to the company.

© 2026 Fracton Project. Open Source & Private. (Your fractons stay local.)
Notification