Toky - data protection & trust analysis

Toky

Toky

About

Your phone system connected to everything

Analysis Summary

🔬   Our analysis indicates that Toky is protecting users' data with a good infrastructure security in place, and their clear data protection policy; however, community signals are thin or insufficient.

✅   Our security analysis didn't find any cloud or infrastructure risks, which means that Toky should be safe to use and relatively protected against cyber-attacks and data breaches caused by hackers.

⚠️   The user-base and community analysis indicate low engagement and limited trust in the app marketplace.

Integrations

Note: This is an AI-powered analysis, please don't rely on this only and consult an expert for any 3rd-party security / privacy questions.

How scores are calculated? Learn more

Developer of this app?
Report mistake or send request

Data Safety Score 8.5/ 10

PRIVACY privacy score tooltip
Estimated restriction level from intentional data sharing, selling, and monetization.
good
SECURITY security score tooltip
Estimated protection level against unintentional data breach, lose, and exposure.
no issues found
COMMUNITY trust score tooltip
Estimated trust and sentiment of existing users and general community.
limited
Note: This is an AI-powered analysis, please don't rely on this only and consult an expert for any 3rd-party security / privacy questions.

How scores are calculated? Learn more

Developer of this app?
Report mistake or send request
Toky

Data Safety Score 8.5/ 10

Privacy Policy

Privacy Policy

SCORE 8.4/ 10

Privacy Policy

Limited data sharing

To what extent does Toky restrain from aggregating personal information and using it for monetization, such as sharing data with ad networks or selling data to 3rd-parties.

Security measures

The measures Toky is taking to secure your data (based on their privacy policy). Such measures include personal information obfuscation, cyber-security, encryption, and protection by design.

Transparency & control

The data controls provided by Toky, like asking for consent, an option to opt-out from data collection, the right to be forgotten, and information like data retention, and notifying you in case of a breach.



Note: This analysis was generated by an automated semi-supervised AI. We do our best to improve it and validate its accuracy, but we can't guarantee it.

You can find the analyzed privacy-policy here:

https://toky.co/privacy

PRIVACY SCORE 8.4/ 10

The app’s ranking is based on our own subjective judgment and discretion. The criteria that we have evaluated and our ranking method are disclosed and explained here.

Cloud Security

Cloud Security

SCORE 10.0/ 10

Cloud Security

Data in transit

Encryption

Data storage

Emails

Data in transit

high risk
mid. risk
low risk

Encryption

high risk
mid. risk
low risk

Data storage

high risk
mid. risk
low risk

Emails

high risk
mid. risk
low risk

We have analyzed 2 public endpoints related to this app and found 0 security risks in total.

Cloud and infrastructure security is an essential factor in determining your data is safe with an app or integration. Generally, modern web apps and integrations should not have any critical security issues.

SECURITY SCORE 10.0/ 10

The app’s ranking is based on our own subjective judgment and discretion. The criteria that we have evaluated and our ranking method are disclosed and explained here.

Community Trust

Community Trust

SCORE 3.9/ 10

Community Trust

Twitter
limited
limited


We've analyzed 0 marketplace engagement signals, and 966 social network signals.

User engagement signals in the app marketplaces and social networks indicate user-base satisfaction and community health, which helps us determine whether the app is legit and trustworthy.

Note: The actual engagement numbers might be higher as some marketplaces do not share the number of installs, reviews, and rankings.

COMMUNITY SCORE 3.9/ 10

The app’s ranking is based on our own subjective judgment and discretion. The criteria that we have evaluated and our ranking method are disclosed and explained here.

Permission Analysis

Permission Analysis

PRO VERSION
Regulatory Compliance

Regulatory Compliance

PRO VERSION
Known Data Breaches

Known Data Breaches

PRO VERSION
Startup or Developer?

Seamlessly verify your privacy & security, showcase data protection, and boost user trust & adoption.

Create Free Account

Please note, that we only rank certain ranking subjects including encryption, data storage, data sharing, security measures being taken, transparency and users’ control, number of installs, reviews, followers, etc. Thus, ranking results may change as additional ranking subjects are added, or existing ranking subjects are omitted.

General Disclaimer: Given that the service is based on a statistical heuristics, you may find the ranking inaccurate, unfavorable, unhelpful, not compatible with your requirements, or objectionable. Protective.ai, and its officers, directors, employees and affiliates (“Staff”), disclaim any and all liability for any matter relating to the ranking subjects’ opinions and recommendations, including their accuracy, or their failure to properly disclose a position in, affiliation with, or nexus they may have to the respective apps they analyze or report on.