Last updated: March 2026
Nothing. Pluks does not collect, transmit, or share any personal data, usage data, or any other information about you or your activity.
The Pluks desktop app monitors mouse activity locally on your device to detect when you select text. When a text selection is detected, it simulates a copy operation and saves the result to a local SQLite database stored in your application data folder. This database never leaves your computer.
Password fields are skipped automatically. Before every
capture, Pluks asks macOS Accessibility for the role of the focused element.
If it's AXSecureTextField — the role used by every standard
password input on macOS, including Safari logins, the system unlock prompt,
and password managers — Pluks does not simulate a copy, does not read the
clipboard, and stores nothing in history.
Pluks uses two services to collect anonymous, opt-out telemetry: PostHog for usage analytics and Sentry for error and crash reports. Both are sent against an anonymous UUID generated locally on first run — there is no account, no email, no device fingerprint.
11-100, 101-1000) — never the value.?opt_out=1 to any pluks.app URL once.All data is stored exclusively on your device — a SQLite database in your local application data folder. You can clear all history at any time from within the app.
Pluks is fully open source under the MIT license. You can inspect every line of code at github.com/darth-pixit/pluck-app.
If this policy changes, the updated version will be posted at pluks.app/privacy with a revised date.
Questions? Open an issue at github.com/darth-pixit/pluck-app/issues.