The All-Seeing Eye

This application provides an interactive exploration of the ANTHROPIC_SURVEILLANCE_MAP.md report. It visualizes the technical analysis of the tracking infrastructure documented on the claude.ai website. The report documents a comprehensive surveillance system capable of capturing detailed user interactions, including keystrokes and editor inputs.

Infrastructure Overview

This diagram shows the flow of your data from browser to Anthropic's analytics backend.

USER BROWSER (TARGET)

Page load triggers tracking initialization

โ†“
CLOUDFLARE RUM BEACON

Event listeners (click, keydown, touch) & UUID generation

โ†“
COLLECTION & PROCESSING LAYER

editor.main.js instrumentation & analytics core

โ†“
DATA TRANSMISSION LAYER

Sends data via navigator.sendBeacon() to Cloudflare

โ†“
CLOUDFLARE ANALYTICS BACKEND

Session aggregation & user profiling

โ†“
ANTHROPIC ACCESS LAYER

Real-time access to user sessions, keystrokes, heatmaps & A/B test data

Key Component File Sizes

Large JavaScript files indicate significant tracking complexity.

Key Findings & Capabilities

The report documents a wide range of surveillance capabilities. The matrix below outlines the privacy impact of each data collection method.

Surveillance Capabilities Matrix

Capability Implemented Data Collected Privacy Impact
Page Views โœ… URL, referrer, timestamp Medium
Click Tracking โœ… Element path, timing High
Keystroke Monitoring โœ… Event type, timing CRITICAL
Form Interaction โœ… Element paths CRITICAL
Code Editor Input โœ… Via editor.main.js CRITICAL
Mouse Tracking โœ… Pointer events High
Session Stitching โœ… UUID + tokens High
Memory Profiling โœ… Heap sizes Medium

What Anthropic Can See

This infrastructure allows for deep analysis of user behavior. Here are the documented capabilities:

User Journey Reconstruction

Ability to replay a user's session, including every page visited, button clicked, and form interacted with, in the exact sequence and timing.

Code Editor Activity

Analysis of what users type into prompts, typing speed, editing patterns (like backspaces), and use of code completion.

Performance Profiling

Measurement of a user's device speed (memory, timing) and network capabilities (resource load times).

Interaction Patterns

Detection of user hesitation before clicking, reading time (based on visibility duration), and feature usage frequency.

Data Flow Architecture

The report outlines a multi-stage process for how data is collected, processed, and transmitted. This flowchart visualizes the lifecycle of a single piece of user data.

  • 1

    Stage 1

    Initialization

    Page load executes tracking script. A UUID is generated, and event listeners are injected to capture clicks, keys, and performance.

  • 2

    Stage 2

    Data Collection

    User interactions (clicks, keystrokes) are captured, tagged with a CSS selector path and timestamp, and queued in a memory buffer.

  • 3

    Stage 3

    Transmission

    On page unload or timer, data is serialized and sent via navigator.sendBeacon() to cloudflareinsights.com. This survives page closing.

  • 4

    Stage 4

    Backend Processing

    Cloudflare ingests the data, reconstructs the session, and profiles the user. Anthropic gains access to this analyzed data via dashboards and APIs.

Legal & Compliance Concerns

The report raises significant legal and ethical questions regarding this data collection, particularly concerning user consent and data minimization principles.

  • No Explicit Consent: Tracking allegedly starts immediately on page load without a cookie banner or opt-out mechanism for RUM (Real User Monitoring).
  • Third-Party Processing: Data is sent to Cloudflare, a third-party processor, without users being informed or a data processing agreement being disclosed.
  • Excessive Data Collection: Keystroke monitoring and element-level tracking may violate Article 5 (data minimization).
  • No "Do Not Sell" Option: Sharing data with Cloudflare could potentially constitute a "sale" under CCPA definitions, yet no opt-out is provided.
  • Lack of Disclosure: The privacy policy may not specifically cover the scope of RUM data collection or the involvement of Cloudflare.
  • Wiretap Act (18 U.S.C. ยง 2511): The report suggests that real-time keystroke monitoring could be interpreted as a form of electronic surveillance.
  • Computer Fraud and Abuse Act (CFAA): Collecting detailed user input and interactions may be seen as exceeding authorized access to the website.

The Solution: AI Privacy Shield

In response to these findings, the AI Privacy Shield browser extension was developed. It's a surgical tool designed to block this specific surveillance infrastructure *without* breaking the core functionality of the AI platforms.

AI Privacy Shield

Active Protection

A Multi-Layered Defense

The extension employs a multi-layered strategy to neutralize tracking, based on the evidence found across all major AI platforms.

Tier 1: Tracker Blocklist

Based on blocklist.json, the shield blocks requests to known surveillance domains:

  • *statsig* (Session Recording)
  • *honeycomb.io* (Telemetry)
  • *segment.io* / *.com* (Analytics)
  • *cloudflareinsights* (RUM / Keystroke Logging)
  • *amplitude.com* (Product Analytics)
  • *google-analytics.com* (Tracking)
  • *play.google.com/log* (Gemini Telemetry)
  • *gator.volces.com* (ByteDance Telemetry)
  • ...and 29+ other patterns.

Tier 2: Surgical Header Stripping

To prevent A/B testing and fingerprinting by Google, the shield removes specific request headers, as defined in google_header_scrub.json:

"operation": "remove", "header": "x-client-data" (A/B Experiment ID)

"operation": "remove", "header": "sec-ch-ua" (Fingerprinting)

"operation": "remove", "header": "sec-ch-ua-platform" (Fingerprinting)

"operation": "remove", "header": "sec-ch-ua-mobile"

...and 7+ other sec-ch-ua-* headers.

Tier 3: Strict Mode Cookie Killing

Based on cookie-killer.md and popup.js, an optional "Strict Google Mode" actively deletes tracking cookies on page load:

  • _gcl_aw (Google Click Tracking)
  • _gcl_dc (DoubleClick)
  • _ga (Google Analytics)
  • _ga_* (GA Property IDs)
  • NID (Google Network ID / Cross-Site Tracking)