B
Bunthu

Privacy policy

We value your privacy and keep things simple: by default your input stays in your browser. This page explains what we may collect, how we use it, and how you can control it.

Stays in your browser

  • Text you enter into tools (processed locally)
  • Temporary results unless you choose to save/share them

May be sent to servers (with your consent)

  • Saved or shared results you explicitly submit
  • Optional account data when you register

In short

We do not collect or store the text you enter. Most tools process data locally in your browser by default.

Data we collect

We only collect minimal anonymous analytics data to improve the site and any optional account data if you create an account. Your input text is not collected unless you explicitly save or share it.

Contact

For privacy questions or data requests email support@bunthu.com.

What we do with your data

By default, tools run in your browser and input is not sent to our servers. If a tool requires a server (for example, to save or share results), we will clearly indicate that and request consent.

Analytics

We collect minimal anonymous usage data (page views, errors) to improve the site. This does not include the content you enter into tools.

Third-party services

The site uses the following third-party services: Google AdSense (ads), Google Analytics (site analytics), and Bing Webmaster Tools. These services may set cookies or collect anonymized usage data per their policies.

Your rights

  • Request data deletion or export by emailing support@bunthu.com.
  • Opt out of analytics via the site settings when available.

Security

We take reasonable measures to protect data we store. However, no system is 100% secure — avoid submitting highly sensitive personal data unless you understand where it is saved.

Security & scanning practices

We run automated security scans, dependency vulnerability checks (dependabot/automated tooling), and CI tests on code and assets. We perform periodic manual reviews and address reported vulnerabilities promptly. These practices reduce risk but do not guarantee absolute security.