Back to search

Our Methodology

Our ratings and comparisons are based on objective criteria designed to help users evaluate software based on transparency, user control, and value - not subjective preferences.

Rating Criteria

Each alternative is rated on a 1-5 star scale based on the following weighted factors:

Transparency (30%)

How clear and accessible are the privacy policies, terms of service, and data practices? Do they clearly explain what data is collected and how it is used?

User Control (25%)

Can users easily export their data? Delete their accounts? Opt out of certain data collection? Control sharing settings?

Switching Ease (25%)

How difficult is it to migrate to or from this service? Are standard protocols and formats supported? Is data portability a priority?

Value (20%)

Does the service provide good value for its price point? Is there a functional free tier? Are paid features reasonably priced?

Data Collection

We gather information from the following sources:

  • Official privacy policies and terms of service
  • Company websites and documentation
  • SEC filings and annual reports (for public companies)
  • Independent security audits and certifications
  • Reputable technology journalism and analysis
  • Open source code repositories (where applicable)

Data Usage Categories

We categorize data usage into the following types:

Service DeliveryData used to provide the core service functionality
SecurityData used for fraud prevention, abuse detection, etc.
Product ImprovementData used to analyze usage and improve features
AI TrainingData potentially used to train machine learning models
AdvertisingData used for targeted advertising purposes

Update Frequency

We review and update our data quarterly, or sooner when significant changes occur (such as acquisitions, policy updates, or major security incidents).

Corrections: If you believe any information is inaccurate or outdated, please contact us with documentation and we will review and update accordingly.

Built with v0