Surveillance Intelligence Platform

They've been studying you
for years.
Now you study them.

A growing set of free tools to see who's watching you online — who owns the trackers, what data they collect, and what your browsing is worth to them.

"The most comprehensive open tracker database on the internet."
53k+
Domains Indexed
6,600+
Corporate Entities
3
Data Sources Merged
704
Entities on Radar

LIVE NOWFree Tools, No Account Required

Everything below is built and running. No sign-up. No API key for basic use. The data is sourced from DuckDuckGo Tracker Radar, the IAB TCF Global Vendor List, and Disconnect.me — merged, scored, and updated weekly.

How the data is built: DuckDuckGo Tracker Radar provides prevalence and fingerprinting data across 80M sites. The IAB TCF GVL v3 provides declared consent purposes from 800+ ad-tech vendors. Disconnect.me provides the tracker categories Firefox and Brave use to block. All three are merged per domain into a single record with a composite 0–100 score. Updated every Sunday at 3am.

SURVEILLANCE EXPLORERLook Up Any Domain

The Explorer answers the question no other tool answers in one place: who is this company, what are they doing with my data, and how aggressive are they about it?

Exact Domain Lookup
doubleclick.net → score 94, Google Ad Tech, TCF Purposes 1–10, 94% site prevalence, active fingerprinting
Company Search
Type "LiveRamp" → all domains, parent company (Acxiom → IPG), industry: data broker
Shareable URLs
tunnelmind.ai/explore?q=facebook.com — link directly to any domain report
Score Formula
Prevalence (30%) + Fingerprinting (25%) + Cookie age (15%) + Category risk (15%) + TCF breadth (15%)
doubleclick.net
Score: 94  ·  Ad Technology  ·  Google LLC (Alphabet Inc.)
Prevalence: 81.4% of sites  ·  Fingerprinting: Active (canvas/audio)
Cookie age: 2 years  ·  TCF Vendor ID: 755
TCF Purposes: P1 P2 P3 P4 P7 P8 P9 P10 (Create profiles · Select ads · Measure performance · Model audiences)
Data collected: browsing · interests · behavior · demographics

SURVEILLANCE RECEIPTYour Data Has a Price. See the Invoice.

Upload your Chrome, Firefox, or Safari history export. The receipt parser matches every domain against the tracker database, attributes each hit to its corporate parent, assigns a CPM value, and generates a line-item invoice — the same way ad exchanges actually price your data.

Fully client-side. The receipt is computed in your browser using a bundled copy of the tracker database. No server sees your history.

Google (all properties)
$4.20 · 12,847 connections · behavioral targeting, ad profiles
Meta
$2.80 · 6,203 connections · social graph, purchase intent
Oracle BlueKai
$3.40 · 892 connections · data broker, demographics, income
Your Total
$247/year estimated · 94 unique surveillance actors · shared with 3 jurisdictions

TRACKER DATA APIdata.tunnelmind.ai

A public REST API serving the full normalized dataset. Build your own tools on top of it. The free tier requires no key — just fetch.

EndpointDescriptionFree Tier
GET /v1/domains/:domainFull record for one domain — entity, score, TCF, prevalence50/day
GET /v1/domains?category=ad_techPaginated domain list, filterable by category and min score50/day
GET /v1/search?q=googleFull-text search across domains and entities50/day
GET /v1/entities/:slugEntity record + all associated domains50/day
GET /v1/healthDataset stats — domain count, entity count, last updatedUnlimited

All responses: {"ok":true,"data":{...},"meta":{"took_ms":N}}  ·  CORS open to all origins  ·  No key required for free tier  ·  Pro keys (5k/day) and Enterprise (unlimited) available.

THE FOUNDATIONWhat's Under Everything

The tracker tools are the consumer surface. The infrastructure underneath them — eBPF kernel enforcement, hardware-anchored device identity, cryptographic attestation chains, and a local LLM for natural language control — is the foundation for three larger products in development.

eBPF TC Hooks
Kernel-level packet inspection on wg0. Sub-microsecond. Cannot be bypassed by userspace — including a compromised agent.
Hardware-Anchored Identity
Device certs rooted in TPM/iSIM/Secure Enclave. WireGuard pubkey IS the device identity. IEEE 802.1AR LDevID, 24hr TTL.
Behavioral Attestation Chains
Every event: SHA-256 hashed, linked to previous, Merkle tree, Ed25519 signed. Tamper one → all break.
Local LLM Control Plane
Ollama + Mistral 7B on-node. No data leaves for inference. Talk to your network in plain English. Air-gapped.
APPLICATION LAYER USERSPACE KERNEL IDENTITY HARDWARE MUTABLE AI Agents LLM, AutoGen, etc. Browsers Human traffic Firewalls / SIEM Can be lied to ✗ TUNNELMIND USERSPACE Attestation Chain Policy Engine MCP + LLM Natural Language Surveillance Intel Ed25519 · Merkle tree · YAML policies · Ollama + Mistral · 11 MCP tools KERNEL ENFORCEMENT — CANNOT BE BYPASSED eBPF TC Hooks on wg0 Per-packet · sub-μs · 7-step pipeline WireGuard Interface Encrypted mesh · wg0 LDevID Certificate X.509 · IEEE 802.1AR · 24hr TTL · 4 Custom OIDs OID.1 TrustTier OID.2 PolicyTags OID.3 HwPlatform OID.4 WGPubKey VAULT PKI ISSUES u8 trust_tier iSIM / EID GSMA SGP.02 TIER 0 TPM 2.0 TCG · StrongBox TIER 1 Secure Enclave Apple SE · TrustZone TIER 2 Software Only ECDSA P-256 · memory TIER 3 Platform-specific evidence verified → single universal certificate issued TRUSTED UNTRUSTED ← ONE CERT ← MANY HW
Fig. 1 — Shared foundation. Diverse hardware converges into one LDevID. eBPF reads one byte. The tracker tools are the first consumer surface. The products below build on this.

COMING NEXTThree Products in Development

The tracker database, explorer, and receipt tools are the public surface layer — and the first consumer touchpoint. These three products are in active development on top of the same foundation.

In Development
TunnelMind Personal
Desktop app · Windows + Mac

Real-time surveillance graph. Every tracker, attributed to its corporate parent, shown as it connects. DNS sinkhole, eBPF enforcement, and the Dark Mirror — your complete surveillance dossier.

In Development
TunnelMind Enterprise
Buyer: CISO · DPO · NetSec

AI agent governance with cryptographic proof. Behavioral attestation chains, kernel-level policy enforcement, one-click compliance exports verifiable with openssl.

Planned
TunnelMind Intelligence
Buyer: Carrier · Threat Intel

Distributed shadow BGP dataset. Prefix hijack detection, jurisdiction mapping, route path history — cryptographically signed by hardware-anchored nodes across the network.

Every Personal user is a sensor node. Their anonymized data feeds the Intelligence dataset. The dataset makes Enterprise more valuable. The flywheel compounds.

THE INTERFACETalk to Your Network in Plain English

The MCP server is the control plane for all three products. Bound exclusively to the WireGuard interface — only reachable from inside the authenticated tunnel. A local LLM (Ollama + Mistral 7B) runs on-node. No data ever leaves for inference. Air-gapped intelligence.

Who has been watching me the most this week?
Top surveillance actors (7 days):
1. Google (US · PRISM) — 12,847 connections · $4.20 est. value
2. Meta (US) — 6,203 connections · $2.80
3. Amazon (US) — 3,891 connections · $1.50
4. ByteDance (CN) — 1,204 connections · FLAGGED
5. Oracle BlueKai (US · BROKER) — 892 connections · $3.40

Total estimated annual data value: $247.00
Block all agent traffic to Chinese-controlled ASNs
Done. Added BLOCK rule for source_class=AGENT → jurisdiction=CN. Policy hash updated: e4a91c.... eBPF policy_map updated — 847 prefixes enforced. Effective immediately.

11 MCP tools expose every capability: tunnelmind_status, tunnelmind_block, tunnelmind_allow, tunnelmind_policy_set, tunnelmind_attest, tunnelmind_graph_query, tunnelmind_agent_audit, tunnelmind_node_list, tunnelmind_bgp_query, tunnelmind_identity_verify, tunnelmind_cost_of_me. The LLM decides which tools to call. You just ask.

WHAT WE DON'T BUILDDeliberate Constraints

ExclusionRationale
Profile poisoningContradicts the observation thesis. We show you the truth — we don't corrupt the data. Legal exposure.
Agent identity certificatesCan't prove what happens after prompt injection. Behavior attestation scales. Identity doesn't.
BGP route injectionRead-only observer. Never modifies routes. Trust and legal boundary.
Cloud LLM inferenceLocal only (Ollama + Mistral). No data leaves the node. Air-gapped.