AGNETHOS
ELEVATE THE STANDARD
Most security work asks “is it compliant?” The better question — and the harder one — is “is it defensible?” Not in court. In conscience. Agnethos exists to answer the second question with the same rigor the industry brings to the first.
FTC enforcement
Surveillance capitalism
Harm vectors
Contextual integrity
Privacy by design
HIPAA regulatory gaps
Consent architecture
Data monetization
Virtue ethics
Technology accountability
FTC enforcement
Surveillance capitalism
Harm vectors
Contextual integrity
Privacy by design
HIPAA regulatory gaps
Consent architecture
Data monetization
Virtue ethics
Technology accountability
The framework
Ethics isn't opinion.
It's analysis.
Every case study is grounded in primary legal documents, technical investigation, and philosophical theory. Every grade is citable.
Privacy
25% weight
What data is collected, how long it's retained, and who it ultimately reaches — including third parties and ad platforms.
Consent
25% weight
Whether users meaningfully agreed to what's being done with their data — or whether consent was buried, fabricated, or bypassed entirely.
Transparency
20% weight
Whether public statements, privacy policies, and marketing claims accurately reflect what the product actually does technically.
Security
15% weight
Technical controls in place, breach history, third-party audit practices, and whether security posture matches public claims.
Our Organization
Find out about our mission, methods, and the results of our decades of advocacy.
Take Action
Discovery calls are 30 minutes, free of charge, and result in a one-page scoping memo whether or not we end up working together.
AGNETHOS
Cybersecurity, compliance, and ethical impact assessment for organizations that want to elevate the standard — not just satisfy it.
COMPLIANCE AUDITS
ARCHITECTURE REVIEW
ETHICAL IMPACT
LAB:
PUBLIC SCORECARDS
FRAMEWORK v1.0
METHODOLOGY PAPER
OFFICE:
REQUEST AUDIT
PRESS & SPEAKING
LINKEDIN
SIGNAL