Our Methodology
We believe in full transparency about how we evaluate and recommend European alternatives. Here is exactly how it works.
Evaluation Criteria
Every product is evaluated against seven criteria, weighted by importance to data sovereignty and user value.
Data Sovereignty
25% weightWhere is the company headquartered? Where are their servers located? What legal jurisdiction governs your data?
- Company HQ location (must be EU/EEA/Switzerland)
- Data center locations (EU hosting required)
- Parent company ownership and jurisdiction
- No US subsidiary or parent company
Privacy & Security
25% weightWhat technical measures protect your data? We prioritize products that minimize data collection and maximize protection.
- End-to-end encryption availability
- Zero-knowledge architecture
- Security certifications (ISO 27001, SOC 2)
- Independent security audits
- Open-source code for public review
GDPR Compliance
20% weightBeyond the legal minimum. We look for companies that embrace GDPR principles, not just comply under pressure.
- Clear, readable privacy policy
- Easy data export functionality
- Simple account deletion process
- Transparent data processing practices
- Data Processing Agreement (DPA) availability
Feature Parity
15% weightHow well does the alternative replace the US product? We assess core functionality and user experience.
- Core feature coverage
- User interface quality
- Platform availability (web, mobile, desktop)
- Integration capabilities
- Regular updates and improvements
Pricing & Value
10% weightFair pricing for the value provided. We look for sustainable business models that do not rely on selling user data.
- Free tier availability and limitations
- Paid plan value compared to alternatives
- Business/team pricing
- No hidden costs or dark patterns
Ease of Migration
5% weightHow easy is it to switch from the US product? Better import tools and documentation make switching more accessible.
- Data import tools from major providers
- Migration documentation quality
- Customer support during migration
- Learning curve for new users
Verification Process
Every product goes through our 7-step verification process before being listed.
Company Research
We verify company registration, HQ location, ownership structure, and any parent company relationships that could affect jurisdiction.
Privacy Policy Review
We read the full privacy policy, looking for data collection practices, third-party sharing, and GDPR compliance statements.
Technical Assessment
We evaluate security features, encryption implementation, and technical architecture based on documentation and testing.
Server Location Check
We verify data center locations and confirm EU/EEA hosting options are available and not just optional add-ons.
Feature Testing
We use the product ourselves to assess functionality, user experience, and how well it replaces the US alternative.
Pricing Analysis
We document all pricing tiers, compare to alternatives, and note any free tier limitations or business pricing.
Final Review
We compile all findings, assign scores for each criterion, and write our honest assessment including any concerns.
Our Independence
Trust is essential. Here is how we maintain editorial independence:
No Paid Placements
Companies cannot pay to be listed, to appear higher in rankings, or to receive a "Recommended" badge. Our rankings are based solely on merit.
Disclosed Affiliates
Some products have affiliate programs. When you click through and sign up, we may earn a commission. These relationships are always disclosed and never influence our ratings.
Equal Treatment
Products with no affiliate program receive the same evaluation process and visibility as those with affiliates. Many of our top recommendations have no affiliate relationship.
Honest Criticism
We note downsides, feature gaps, and concerns for every product. If a product has issues, we say so—even if it is a popular choice or has an affiliate program.
Understanding Our Badges
Products may display badges indicating specific qualities. Here is what each badge means.
Recommended
Our top pick in its category. Excels in privacy, features, and overall value. Products earn this through our evaluation—it cannot be purchased.
GDPR Compliant
Fully complies with GDPR. Has clear privacy policy, offers data export and deletion, and respects all data subject rights.
EU Hosted
Data is stored and processed within EU/EEA data centers. Not just available as an option, but the default or only option.
Open Source
Source code is publicly available for review. Increases trust through transparency and allows security auditing by anyone.
Zero Knowledge
The provider cannot access your data even if they wanted to. Uses client-side encryption where only you hold the keys.
Free Tier
Offers a functional free plan (not just a trial). Free tier limitations are noted on the product page.
Honest Limitations
We cannot guarantee security. While we verify claims and check documentation, we do not audit source code or penetration test every product. Security is a moving target.
Companies change. Ownership, policies, and practices can change after our evaluation. We update our listings but cannot guarantee real-time accuracy.
Your needs are unique. Our recommendations are general guidance. Specific regulatory requirements, industry compliance, or technical needs may require additional evaluation.
No legal advice. This directory provides information, not legal advice. For compliance decisions, consult appropriate legal counsel.
Questions About Our Process?
We welcome feedback and questions about our methodology. Transparency is a core value.