Privacy Policy
MacShield is designed as a local-first privacy tool. This policy explains what data the macOS app and browser extension access, why they need it, where it is stored, and what is never collected.
Plain-language summary
| MacShield does | MacShield does not |
|---|---|
| Store app preferences locally on your Mac. | Sell, rent, or share personal data. |
| Use the macOS Keychain for backup password storage. | Collect message content, browsing history, or screenshots. |
| Use local Chrome storage for extension settings. | Run analytics, advertising SDKs, or tracking scripts. |
| Check hostnames locally to apply website locks. | Operate a backend account, database, or telemetry pipeline. |
Native macOS App
Protected app list and settings
The app stores your selected protected apps and preferences locally through app settings. This can include protected bundle identifiers, idle timeout settings, blur preferences, and automation choices.
Authentication
Touch ID is handled by Apple's LocalAuthentication framework. MacShield does not receive fingerprint or biometric data. Backup password storage and verification use the macOS Keychain.
Apple Watch proximity
If enabled, MacShield uses Bluetooth proximity signals to estimate whether your Apple Watch is nearby and worn. This is used only for local lock and unlock decisions.
Updates
The app uses Sparkle to check for software updates against the configured appcast URL. Update checks are for version availability, not analytics.
Browser Extension
Hostnames
The extension checks the current page hostname to decide whether to apply blur rules or show the website lock screen. It does not build or transmit browsing history.
Password handling
The extension creates a random salt with Web Crypto, hashes your master password with SHA-256, and stores only the hash and salt in chrome.storage.local. The original password is not stored.
Touch ID and WebAuthn
When available, WebAuthn lets the browser request platform biometric verification. MacShield stores only a credential reference needed to request future authentication.
Blur behavior
Message blur is applied with CSS filters. The extension does not read, copy, log, or transmit message text, images, emails, or chat history.
Stored extension values
ms_password_hashandms_password_saltfor local password verification.ms_locked_sitesfor domains you choose to lock.ms_blur_level,ms_blur_avatars, andms_hide_modefor blur preferences.unlockedSitesin session storage for temporary unlock state.
Permission Rationale
MacShield asks only for permissions tied to product features. The detailed list is maintained in the documentation permissions table.
Security Practices
- Open-source codebase for independent review.
- macOS Keychain for native backup password storage.
- Local Chrome storage for extension state.
- No analytics scripts on the website.
- No server-side account system for product telemetry.
Your Choices
- Remove protected apps from MacShield settings at any time.
- Disable macOS permissions in System Settings.
- Clear extension storage by removing the extension from Chrome.
- Disable the extension on specific sites through Chrome controls.
- Review, fork, or modify the source code under the applicable license terms.
Contact
For privacy questions, open a GitHub issue or use the contact page. Do not include private passwords, tokens, screenshots of sensitive content, or personal documents in public issues.