A growing set of free tools to see who's watching you online — who owns the trackers, what data they collect, and what your browsing is worth to them.
Everything below is built and running. No sign-up. No API key for basic use. The data is sourced from DuckDuckGo Tracker Radar, the IAB TCF Global Vendor List, and Disconnect.me — merged, scored, and updated weekly.
Type any domain or company name. Instant breakdown: who owns it, what data they harvest, TCF consent scope, fingerprinting method, cookie lifespan, and a 0–100 surveillance score.
Upload your browser history. Get a line-item invoice showing the dollar value of your data — per company, per category. Fully client-side. Your data never leaves your device.
The full surveillance ecosystem mapped. 704 entities across 9,786 tracker domains — sized by footprint, colored by category. See the entire industry at once. No data required.
REST API serving 53k+ normalized domain records. GET /v1/domains/:domain returns entity, category, score, prevalence, TCF purposes. 50 req/day free — no key required.
How the data is built: DuckDuckGo Tracker Radar provides prevalence and fingerprinting data across 80M sites. The IAB TCF GVL v3 provides declared consent purposes from 800+ ad-tech vendors. Disconnect.me provides the tracker categories Firefox and Brave use to block. All three are merged per domain into a single record with a composite 0–100 score. Updated every Sunday at 3am.
The Explorer answers the question no other tool answers in one place: who is this company, what are they doing with my data, and how aggressive are they about it?
doubleclick.net → score 94, Google Ad Tech, TCF Purposes 1–10, 94% site prevalence, active fingerprintingtunnelmind.ai/explore?q=facebook.com — link directly to any domain reportUpload your Chrome, Firefox, or Safari history export. The receipt parser matches every domain against the tracker database, attributes each hit to its corporate parent, assigns a CPM value, and generates a line-item invoice — the same way ad exchanges actually price your data.
Fully client-side. The receipt is computed in your browser using a bundled copy of the tracker database. No server sees your history.
A public REST API serving the full normalized dataset. Build your own tools on top of it. The free tier requires no key — just fetch.
| Endpoint | Description | Free Tier |
|---|---|---|
GET /v1/domains/:domain | Full record for one domain — entity, score, TCF, prevalence | 50/day |
GET /v1/domains?category=ad_tech | Paginated domain list, filterable by category and min score | 50/day |
GET /v1/search?q=google | Full-text search across domains and entities | 50/day |
GET /v1/entities/:slug | Entity record + all associated domains | 50/day |
GET /v1/health | Dataset stats — domain count, entity count, last updated | Unlimited |
All responses: {"ok":true,"data":{...},"meta":{"took_ms":N}} · CORS open to all origins · No key required for free tier · Pro keys (5k/day) and Enterprise (unlimited) available.
The tracker tools are the consumer surface. The infrastructure underneath them — eBPF kernel enforcement, hardware-anchored device identity, cryptographic attestation chains, and a local LLM for natural language control — is the foundation for three larger products in development.
The tracker database, explorer, and receipt tools are the public surface layer — and the first consumer touchpoint. These three products are in active development on top of the same foundation.
Real-time surveillance graph. Every tracker, attributed to its corporate parent, shown as it connects. DNS sinkhole, eBPF enforcement, and the Dark Mirror — your complete surveillance dossier.
AI agent governance with cryptographic proof. Behavioral attestation chains, kernel-level policy enforcement, one-click compliance exports verifiable with openssl.
Distributed shadow BGP dataset. Prefix hijack detection, jurisdiction mapping, route path history — cryptographically signed by hardware-anchored nodes across the network.
Every Personal user is a sensor node. Their anonymized data feeds the Intelligence dataset. The dataset makes Enterprise more valuable. The flywheel compounds.
The MCP server is the control plane for all three products. Bound exclusively to the WireGuard interface — only reachable from inside the authenticated tunnel. A local LLM (Ollama + Mistral 7B) runs on-node. No data ever leaves for inference. Air-gapped intelligence.
e4a91c.... eBPF policy_map updated — 847 prefixes enforced. Effective immediately.11 MCP tools expose every capability: tunnelmind_status, tunnelmind_block, tunnelmind_allow, tunnelmind_policy_set, tunnelmind_attest, tunnelmind_graph_query, tunnelmind_agent_audit, tunnelmind_node_list, tunnelmind_bgp_query, tunnelmind_identity_verify, tunnelmind_cost_of_me. The LLM decides which tools to call. You just ask.
| Exclusion | Rationale |
|---|---|
| Profile poisoning | Contradicts the observation thesis. We show you the truth — we don't corrupt the data. Legal exposure. |
| Agent identity certificates | Can't prove what happens after prompt injection. Behavior attestation scales. Identity doesn't. |
| BGP route injection | Read-only observer. Never modifies routes. Trust and legal boundary. |
| Cloud LLM inference | Local only (Ollama + Mistral). No data leaves the node. Air-gapped. |