Let’s talk about the elephant in the room.

If you go to the Chrome Web Store, download ThunderSweep, and try to connect your Gmail account, you will not receive a warm welcome. Instead, you'll be slammed with a bright red warning screen from Google displaying a terrifying message: "Google hasn't verified this app." It then explicitly tells you to go back to safety.

If you choose to proceed by clicking "Advanced", you will understandably be warned that this application wants permission to read, modify, and delete your emails and Google Drive files.

From a user's perspective, this is the ultimate red flag. Why on earth would anyone trust an unknown LLC over Google? If even Google doesn't trust this app, why should you?

This exact paradox has caused me countless sleepless nights. Building a privacy tool as a solo developer is a brutal, uphill battle. You are competing against millions of other polished extensions, and worse, the very tool you built to protect people's privacy trips every security alarm built into the internet.

But I'm writing this manifesto because the alternative—leaving your data exactly where it is—is far more dangerous than you realize.

The Problem Nobody is Talking About

We treat Gmail and Google Drive like infinite, permanent filing cabinets. Think about the last five years of your life. When you bought a house, you emailed your mortgage broker PDFs of your passport and two months of bank statements. During tax season, you emailed your CPA a folder containing your W-2s, 1099s, and a Form 1040 complete with your Social Security Number.

Those emails didn't vanish after they were sent. They are still sitting perfectly preserved in your "Sent" folder.

Usually, the argument stops at hackers: If a hacker gets into your account, they can steal your identity. And that is true. A hijacked session cookie or a breached third-party app connected to your inbox turns your email history into a silver platter for identity thieves.

But let's assume you have perfect security. You never click a phishing link. You have hardware two-factor authentication. You never get hacked.

Your data is still completely at the mercy of Google's Terms of Service.

Big Tech policies change constantly. Right now, Google says they don't scan your personal emails to train their core AI models or show personalized ads inside Gmail. But what about next year? What about five years from now? When they update their privacy policy, you usually get a vague email giving you 30 days to accept the new terms or lose access to your account.

If your W-2s, passports, and tax returns are sitting in plain text in your inbox, you have no leverage. You are forced to agree to whatever new data-parsing or AI-training rules they invent tomorrow, simply because unearthing 10 years of scattered attachments to manually delete them is near impossible.

I realized the only way to actually protect this data—and achieve true peace of mind—was to rely on math, not a corporate privacy policy.

If you encrypt a W-2 with standard AES-256 encryption, it doesn't matter how Google's policies change in the future. It doesn't matter if they train an AI on it, or if they scan it for metadata. To Google's servers, the file is literal mathematical gibberish. They cannot read the file, and they cannot even read the metadata inside it.

And as a massive secondary benefit: having all your sensitive documents organized in a single, secure vault in Google Drive makes them infinitely easier to find when you actually need them, rather than furiously searching your Gmail history for a generic filename like scan_2019.pdf every tax season.

So, I built ThunderSweep.

The Architecture of Trust (How It Works)

I knew that asking users to grant an unknown application access to their inbox required total architectural transparency. ThunderSweep does not just blindly delete your emails. It is a highly engineered local security scanner. Here is exactly what is happening when you press "Scan":

1. Local Attachment Parsing
Instead of forwarding your emails to a cloud server to figure out what they are, ThunderSweep downloads the raw binary of your attachments directly into your browser's temporary memory. We use an intensive local library (pdf-parser.js) to open PDFs, spreadsheets, and Word documents entirely within your CPU.

2. The Regex Engine
Once the text is extracted locally, the extension runs your documents through a robust pattern-matching engine. It doesn't just look for filenames. It uses advanced Regular Expressions (Regex) to scan the actual contents of the PDFs for structured data—like the exact format of Social Security Numbers (XXX-XX-XXXX), routing numbers, financial keywords, and tax vocabulary.

3. The AES-256 Vault
Finding the data is only half the battle. You can't just delete a five-year-old W-2; you might still need it in an audit. When you choose to secure a file, ThunderSweep doesn't store it on my servers. Instead, it generates a unique AES-256 encryption key locally in your browser. It locks the file, uploads the encrypted ciphertext back to a designated "ThunderSweep Vault" folder in your Google Drive, and then securely deletes the exposed original from the cloud.

4. Frictionless Restoration & Secure Sharing
Security tools only work if they don't paralyze your workflow. If you ever need to reply to an old email or reuse a secured W-2, ThunderSweep lets you seamlessly restore the file back to its original, unencrypted state.

More importantly, it fundamentally fixes how you send sensitive files. If you need to send a tax document to an accountant, ThunderSweep ensures the file is encrypted before it hits the internet, protecting data in transit.

Rather than sending a vulnerable email attachment, ThunderSweep locks the file with a newly generated, one-time AES-256 key. It creates a link where the decryption key is hidden inside the URL fragment (the part after the #). Because web browsers inherently never transmit URL fragments to servers, neither Google, your ISP, nor ThunderSweep ever sees the decryption key. When the recipient opens the link, the encrypted file is downloaded and unsealed entirely within their local browser—a true Zero-Knowledge transfer.

Once received, if your recipient has ThunderSweep installed (even the free version), they can safely store the decrypted file directly into their own local vault. If they prefer not to install any extensions, ThunderSweep can alternatively package the document into an AES-256 password-protected ZIP file before it ever leaves your computer, allowing them to extract it securely using any standard zip software.

Even if Google scans your Drive after that point, all they see is mathematical gibberish.

The Catch-22: Punished for Being Secure

To perform this deeply complex local analysis, the extension genuinely requires restricted access to gmail.readonly, gmail.modify, and Google Drive scopes.

And naturally, Google flags this. To remove the "Unverified App" warning, Google forces developers to undergo an annual Cloud Application Security Assessment (CASA) audit through an authorized third-party lab. Depending on the exact scopes and user volume, this mandates passing either a Tier 2 or Tier 3 assessment.

The framework is rigid. According to authorized testing labs, a Tier 2 scan starts at $540 and scales up to $1,800, while a full Tier 3 manual audit costs upward of $4,500 every single year. The labs test against the OWASP ASVS framework, designed to penetrate-test a traditional SaaS company's backend servers, databases, and authentication endpoints to ensure they aren't leaking user data.

But here is my hurdle: I don't have a backend.

ThunderSweep is a 100% client-side application. I do not own a database holding your emails. I do not even have a backend server for these security labs to run their vulnerability scanners against. Because ThunderSweep uses restricted scopes, Google's policy rigidly mandates this Tier 2 lab audit anyway, completely regardless of the app's architecture. There is no exemption checkbox for "I don't have a backend."

When I started building this, I deliberately priced ThunderSweep as low as possible to make privacy accessible. I had no idea there was an annual "security tax" of at least $540 just to exist. Navigating Google's automated bureaucracy as a self-funded developer to prove a negative is incredibly difficult, and paying a corporate lab to audit non-existent servers before acquiring enough users to even cover the fee is an absurd Catch-22.

So for now, the app remains "Unverified," and I am left asking users to take a chance on a warning screen.

Don't Trust Me. Trust Your Browser.

I have spent an immense amount of time stressing over how to bridge this trust gap. How do I convince people that a solo developer isn't secretly scraping their data?

The answer is simple: You shouldn't trust me.

In cybersecurity, "trust" is just another vulnerability. Instead, I ask you to verify the architecture yourself. Because ThunderSweep operates entirely locally, you have the ultimate auditing tool built directly into your computer.

  1. Install ThunderSweep and open the pop-up.
  2. Right-click anywhere in the extension window and select "Inspect."
  3. Navigate to the "Network" tab.
  4. Run a heavy, deep scan of your entire inbox.

Watch the traffic. You will see API calls reaching out to googleapis.com as the extension fetches your emails to your local machine. But watch closely—you will see absolutely zero network traffic going to thundersweep.com or anywhere else. I don't even own a backend server to collect your data if I wanted to. Every single byte of AES-256 encryption and OCR text parsing happens on your local hardware.

I built ThunderSweep because the reality of how we handle our data is terrifying when you actually stop and look at it. I don't have the marketing budget of a massive tech conglomerate. But what I do have is a tool that solves a massive problem, and an absolute commitment to transparency.

So, I invite you to click past the Google warning screen and run a scan. Open your browser's Network tab to verify the architecture yourself, and watch the engine work exactly as described. I built this tool so you no longer have to blindly trust tech giants with your most sensitive history. Take control of your data, encrypt your past, and find peace of mind.

See what's hiding in your inbox

Open your Network tab, start a scan, and see exactly what sensitive data has been sitting in your inbox for years. 100% local. Zero cloud risk.

Try ThunderSweep Free