隱私工具
在分享前清除中繼資料與敏感資訊,完全在瀏覽器中執行。
隱私工具
-
URL 追蹤參數清除器
立即從 URL 中移除 utm_*、fbclid、gclid 及其他追蹤參數。
開啟工具 →
-
追蹤像素偵測器
掃描 HTML 中隱藏的追蹤像素與第三方分析腳本。
開啟工具 →
-
檔案元資料清除器
從 PDF 與 Office 檔案中移除作者、GPS、裝置資訊與時間戳記。
開啟工具 →
-
密碼外洩檢查
透過 k-匿名技術檢查密碼是否出現在資料外洩中,密碼絕不離開您的裝置。
開啟工具 →
-
密碼強度檢測器
評估密碼熵值,以及抵抗字典攻擊與暴力破解的能力。
開啟工具 →
-
電子郵件混淆器
將電子郵件地址轉為 HTML 實體,防止機器人擷取。
開啟工具 →
-
QR Code 解碼器
從圖片解碼 QR Code,揭露隱藏的 URL 並檢查追蹤參數。
開啟工具 →
-
圖片遮蔽工具
分享前在照片上的敏感區域繪製黑色矩形遮罩。
開啟工具 →
-
HTML 追蹤清除器
從 HTML 程式碼中移除追蹤像素、分析腳本與監視連結。
開啟工具 →
-
檔案雜湊計算器
計算 SHA-256 與 SHA-1 雜湊值,驗證下載檔案的完整性。
開啟工具 →
Why browser-only privacy tools?
Most online privacy tools are ironically hosted on servers that log your input. Pasting a password into a "strength checker" hosted by an unknown party defeats the purpose. Every tool on this page runs entirely in your browser using standard Web APIs — Web Crypto for hashing, Canvas for image redaction, DOMParser for HTML scanning. Nothing is sent anywhere, and the tools work offline once loaded.
The sole exception is the Password Breach Check, which uses the Have I Been Pwned k-anonymity model: your password is hashed locally, only the first 5 hex characters of the hash are sent to the API, and matching is done in your browser. The full password and full hash never leave your device.
Choosing the right tool
To clean a URL before sharing, use the URL Tracker Cleaner. To audit an email or web page for surveillance scripts, use the Tracking Pixel Detector or Strip HTML Tracking. Before sharing a document, run it through the File Metadata Cleaner to remove author and device information. To blur or black out faces and sensitive text in photos, use the Image Redactor. To verify a downloaded file has not been tampered with, use the File Hash Calculator.
常見問題
- Are these privacy tools truly private?
- Yes. Every tool on this page runs entirely in your browser. Files, passwords, and HTML you paste are never sent to a server. The only exception is the Password Breach Check, which sends only the first 5 characters of a SHA-1 hash to the Have I Been Pwned API — not the password itself.
- What are URL tracking parameters?
- Tracking parameters like utm_source, utm_medium, fbclid, and gclid are appended to URLs by marketers to measure traffic sources. They reveal your browsing path to the site owner and ad platforms. Removing them before sharing a URL protects the recipient's privacy.
- What is a tracking pixel?
- A tracking pixel is a 1×1 transparent image embedded in emails or web pages. When loaded, it notifies the sender that you opened the email or visited the page, along with your IP address and timestamp. The Tracking Pixel Detector tool scans HTML to identify these.
- Why should I strip file metadata?
- PDF and Office files embed metadata including the author name, creation date, software version, and sometimes GPS coordinates from photos embedded in the document. Sharing a file without stripping this metadata can inadvertently reveal personal information.
- How does the k-anonymity breach check work?
- The Breach Check tool hashes your password with SHA-1 locally, then sends only the first 5 characters of that hash to the Have I Been Pwned API. The API returns all hashes starting with those 5 characters, and the tool checks locally whether yours is in the list. Your full password or hash never leaves your browser.
- What does redacting an image do?
- The Image Redactor lets you draw black rectangles over sensitive areas — faces, license plates, document numbers — before sharing a photo. All processing happens on your device using the Canvas API.
- Why verify a file hash?
- When you download software or documents from the internet, the publisher often provides a SHA-256 hash. Computing the hash of the downloaded file and comparing it to the published value confirms the file was not tampered with or corrupted during download.
- Do these tools work offline?
- All tools except Password Breach Check work offline once the page is loaded. Breach Check requires a network request to the Have I Been Pwned API. All other tools use only built-in browser APIs and ship no external runtime dependencies.