Do you have experience with any of these?
https://github.com/DavidHavoc/ToS-Reader-Summarizer
https://github.com/skamal23/ToS-Summarizer
I’m interested in tools that highlight privacy invasive terms and conditions that are often hidden behind legal jargon or wrapped up in so much text that the end user is discouraged to actually read through the terms of service and/or the privacy policy.
This is not the answer to your question, but a comment. Sorry, I am aware that it may not be helpful to you.
I don’t think TOS are very hard to read once you’ve read one or two, if you care, you should just read the TOS.
For example, if you’re concerned about EU-US datatransfer, the privacy policy has to outline who data is shared with, so you can skim it and see if they mention sharing data at all, or if they are doing it with specific companies, or just “partners”.
On the internet and social media, you have to transfer the rights to your content to the social media content, because it’s the only way they’re allowed to store, replicate and distribute your comments or post.
That kind of stuff. And those paragraphs mostly look the same.
ToS;DR is also a useful tool. There is a browser extension and a website
My previous statement is outdated (see replies). I still think TLDRs are inherently wrong, but ToS;DR seems to have improved significantly.
The website is extremely opinionated IMO, which just goes to show how important it is to read the ToS and not a TLDR.Would you mind sharing an example?
After trying to find some examples, I’ve determined that my previous statement is incorrect. It seems the site has expanded by a considerable amount, and the complaints I had (e.g. Tor was ranked something like C while Google was ranked B) no longer apply.
Regardless, I think having someone else summarize a legally binding contract is still a horrible idea in so many ways.
Sweet! What a neat project!
While these tools are nice to get a jist of things they are prone to mistakes and misinterpration. You should not be relying on them if your threat model requires you actually know what data your giving away instead of just being curious.
Thanks! Great advice!


