Transparent Evaluation

Our Methodology

We believe in full transparency about how we evaluate and recommend European alternatives. Here is exactly how it works.

Evaluation Criteria

Every product is evaluated against seven criteria, weighted by importance to data sovereignty and user value.

Data Sovereignty

25% weight

Where is the company headquartered? Where are their servers located? What legal jurisdiction governs your data?

  • Company HQ location (must be EU/EEA/Switzerland)
  • Data center locations (EU hosting required)
  • Parent company ownership and jurisdiction
  • No US subsidiary or parent company

Privacy & Security

25% weight

What technical measures protect your data? We prioritize products that minimize data collection and maximize protection.

  • End-to-end encryption availability
  • Zero-knowledge architecture
  • Security certifications (ISO 27001, SOC 2)
  • Independent security audits
  • Open-source code for public review

GDPR Compliance

20% weight

Beyond the legal minimum. We look for companies that embrace GDPR principles, not just comply under pressure.

  • Clear, readable privacy policy
  • Easy data export functionality
  • Simple account deletion process
  • Transparent data processing practices
  • Data Processing Agreement (DPA) availability

Feature Parity

15% weight

How well does the alternative replace the US product? We assess core functionality and user experience.

  • Core feature coverage
  • User interface quality
  • Platform availability (web, mobile, desktop)
  • Integration capabilities
  • Regular updates and improvements

Pricing & Value

10% weight

Fair pricing for the value provided. We look for sustainable business models that do not rely on selling user data.

  • Free tier availability and limitations
  • Paid plan value compared to alternatives
  • Business/team pricing
  • No hidden costs or dark patterns

Ease of Migration

5% weight

How easy is it to switch from the US product? Better import tools and documentation make switching more accessible.

  • Data import tools from major providers
  • Migration documentation quality
  • Customer support during migration
  • Learning curve for new users

Verification Process

Every product goes through our 7-step verification process before being listed.

1

Company Research

We verify company registration, HQ location, ownership structure, and any parent company relationships that could affect jurisdiction.

2

Privacy Policy Review

We read the full privacy policy, looking for data collection practices, third-party sharing, and GDPR compliance statements.

3

Technical Assessment

We evaluate security features, encryption implementation, and technical architecture based on documentation and testing.

4

Server Location Check

We verify data center locations and confirm EU/EEA hosting options are available and not just optional add-ons.

5

Feature Testing

We use the product ourselves to assess functionality, user experience, and how well it replaces the US alternative.

6

Pricing Analysis

We document all pricing tiers, compare to alternatives, and note any free tier limitations or business pricing.

7

Final Review

We compile all findings, assign scores for each criterion, and write our honest assessment including any concerns.

Our Independence

Trust is essential. Here is how we maintain editorial independence:

No Paid Placements

Companies cannot pay to be listed, to appear higher in rankings, or to receive a "Recommended" badge. Our rankings are based solely on merit.

Disclosed Affiliates

Some products have affiliate programs. When you click through and sign up, we may earn a commission. These relationships are always disclosed and never influence our ratings.

Equal Treatment

Products with no affiliate program receive the same evaluation process and visibility as those with affiliates. Many of our top recommendations have no affiliate relationship.

Honest Criticism

We note downsides, feature gaps, and concerns for every product. If a product has issues, we say so—even if it is a popular choice or has an affiliate program.

Understanding Our Badges

Products may display badges indicating specific qualities. Here is what each badge means.

Recommended

Recommended

Our top pick in its category. Excels in privacy, features, and overall value. Products earn this through our evaluation—it cannot be purchased.

GDPR

GDPR Compliant

Fully complies with GDPR. Has clear privacy policy, offers data export and deletion, and respects all data subject rights.

EU Hosted

EU Hosted

Data is stored and processed within EU/EEA data centers. Not just available as an option, but the default or only option.

Open Source

Open Source

Source code is publicly available for review. Increases trust through transparency and allows security auditing by anyone.

Zero Knowledge

Zero Knowledge

The provider cannot access your data even if they wanted to. Uses client-side encryption where only you hold the keys.

Free Tier

Free Tier

Offers a functional free plan (not just a trial). Free tier limitations are noted on the product page.

Honest Limitations

We cannot guarantee security. While we verify claims and check documentation, we do not audit source code or penetration test every product. Security is a moving target.

Companies change. Ownership, policies, and practices can change after our evaluation. We update our listings but cannot guarantee real-time accuracy.

Your needs are unique. Our recommendations are general guidance. Specific regulatory requirements, industry compliance, or technical needs may require additional evaluation.

No legal advice. This directory provides information, not legal advice. For compliance decisions, consult appropriate legal counsel.

Questions About Our Process?

We welcome feedback and questions about our methodology. Transparency is a core value.