Digital Data Layer is the heart of your tag-management system. Getting user data on Android from third-party application screens

Your actions on the computer are easy to track. As a result of activity in the request history, traces remain in the browser, which it is advisable to delete, since this is confidential information. In this article you will learn how to delete search history in popular browsers, clear information about search queries Google systems and Yandex.

Most of the traces of your time on the Internet are stored in the user data of the Internet browser. Any person, not necessarily an attacker, can easily find out what you were looking for, what you were interested in - in general, what kind of activity you conducted on the Internet. Therefore, you need to delete your query history first. We'll include it here search queries google, yandex, cookies.

On the one hand, it is not necessary to hide information from each user, on the other hand, you are not immune from leakage of confidential information. As soon as an attacker gains access to Google search history or browser user data, good luck.

What data is stored in browser history?

In all popular browsers ( Google Chrome, Firefox, Opera, IE...) are all available necessary funds for thorough removal personal information. But first it is necessary to clarify what is “hidden” under this confidential information in the history of any browser:

  • Cookies are a piece of text received by the browser from the server. Defines user settings on the site. Typically, cookies are used for authorization, tracking session status, or maintaining statistics about users.
  • History - log of page visits: request history, sequence and time of visiting addresses on the Internet. In addition to the History itself, some browsers have a Download History and a History of visited bookmarks.
  • Saved form data, Search history - browsers have an auto-completion function, when when you enter a word or expression, the program suggests possible options previously entered data.
  • Wand passwords - in Opera - passwords and logins for logging into websites. Works like form autofill when clicked keyboard shortcut Ctrl + Enter .
  • Entered addresses - list of addresses entered in address bar browser.
  • Cache - data saved on the hard drive from visited sites: HTML pages, images, flash, etc. The cache serves for more fast loading pages using previously saved files.

How can you delete all information from your browser without exception? Actually, how to delete browser history? Modern Internet browsers They brought this function to the forefront a long time ago, and clearing history is available in two clicks. In different ways, let's look at each specific case and browser.

How to delete browsing history for all browsers at once

I will tell you further about how to delete browser history and website visits through settings.

How to delete history in Opera

  • browsing history in Opera
  • download history
  • Opera cookies, etc.
  • cached images and files
  • form autofill data
  • data third party services

Select the options you want and click the “Delete” button. You can also delete your browsing history for a specified period.

Privacy settings in Opera can be opened at the following address: menu “Tools - Settings”, tab “Security”, section “Privacy”.

To avoid deleting your history, you can use the private navigation mode in Opera using Ctrl combination+ Shift + N .

How to delete history in Chrome (Google Chrome)

You can delete history in Google Chrome at Settings and Google management Chrome (icon on the right top corner browser) - Additional tools - Delete browsing data - Ctrl + Shift + Del.

Available story elements:

  • Download history
  • Browser cookies
  • Images and cache files
  • Passwords
  • Autofill data
  • Other Chrome History Elements

We tick the boxes that need to be deleted from the Google Chrome history and indicate the period: for all time, the past hour, etc.

How to delete history in Mozilla (Mozilla Firefox)

  1. Menu “Tools - Delete personal data”.
  2. Select the list items and click the “Delete Now” button.
  3. Privacy settings: menu “Tools - Settings”, sections “Privacy”, “Protection” and “Advanced”.

How to delete Google search history (Google.com search engine)

Based on the fact that Google is by far the most popular search engine on the RuNet, using its example we will tell you how to delete your query history directly on the user account page in this service.

Actually, for those who would like to delete their Google search history, the search engine developers met halfway and put all the tools for “cleaning up” together.

Big brother Google is watching you: search history at a glance

In order to delete Google history without the possibility of recovery on all accounts, regardless of the device (PC, phone, tablet), do the following:

  1. We go to the page Google account My actions
  2. To delete actions for a certain period
  3. In the “Delete by date” column, select a time interval, for example, All time
  4. We tick the necessary products - for example, Search - in order to completely erase the Google search history in the future
  5. Click the DELETE button to permanently delete your Google search history (after this you will not be able to restore it!)
Delete all Google user history

How to delete history on your phone and tablet (Android)

The easiest way to delete history from your phone is in one fell swoop, using the specialized CCleaner utility. mobile version The application completely removes data that could reveal your privacy by revealing your browsing habits.

The CCleaner utility allows you not only to completely delete browser history on Android, but also to optimize your phone by clearing the cache and other garbage. So its installation will be justified in any case.

How to delete history on Android:

  1. To delete history, go to the "Clear cache and memory" section
  2. Check the "Browsing History" option in CCleaner
  3. Click "Analyze" and "Clear" to complete removal stories

Removing sensitive operating system data

It turns out that there are countless hidden places on your computer where you can find out about your activities. It should be taken into account that more than one program may be involved in the work process. What to do in this case? Searching and deleting information that in one way or another concerns the user is a too long and routine process. Navigating through numerous menus (which for the most part cannot be remembered)… In general, carrying out daily cleaning is a waste of time.

Meanwhile, there are a lot of programs for deleting such information. There are “tweaker” programs where one or more sections serve exactly this purpose. But it is better to use one of the specialized utilities. Here is a list of some of them:

  • NetConceal AntiHistory
  • Privacy Eraser Pro
  • Icesun System Cleaner
  • Advanced System Cleaner
  • Smart Data Scrubber
  • East-Tec Eraser 2008
  • Advanced Tracks Eraser
  • Disk Cleaner Tool
  • AbsoluteShield Internet Eraser Pro

One of the programs that should be on this list is Total Privacy 5. It is the most suitable option for our needs. You can download Total Privacy on the website in the “Download” section. The program is paid, but it works fully functionally in trial mode for 15 days. Unfortunately, it is only available in one language - English. This is a small drawback, given that we will be explaining almost every option in the program.

“Overview” section

By clicking on the “Wash My Computer” button, you will delete the data noted in the “Wash Setup” section from your computer. Therefore, we will return here later.

Wipe Method - method of erasing. This can be erasing in one or several passes (depending on which the chances of restoring the document change) or erasing according to standards (8 types of standards approved in different countries).

Selected Profile - settings saved in the “Profile” section.

Windows Tab

This section contains items related to Windows privacy in general. We will consider the contents of this tab in more detail, the rest - briefly.

“Start Menu” section

  • Empty Recycle Bin - cleaning.
  • Document History - recent list open documents in the Main Menu (see the “Recent Documents” section).
  • Find Files or Folders History - clear Windows search bar history.
  • Run History - clears the history of the “Run” dialog.
  • Find Computer History - clearing the computer search history on the network.
  • Start Menu Click History and Start Menu Order history - surprisingly, all clicks on the Start menu are recorded in the log. You can verify this by clicking on the “View Start Menu Click History” option.

“Browsers” tab

Removing personal information in popular browsers Internet Explorer, Mozilla, Mozilla Firefox, Opera, etc. We will not dwell on this tab. Read more about this in the next chapter.

“Custom” tab

List of applications containing confidential information. Total Privacy pleases with a rich list of supported programs. For example, this includes the following popular apps, like WinRar, Adobe Acrobat Reader, Winamp, Opera, etc. In order for Total Privacy to display a list of only programs available on your computer, check the box next to the “Show only detected programs” option.

“Wipe Free Space” tab

Whenever you delete a file (including deleting it from the Recycle Bin), it still remains on the hard drive - in whole or in part. At the same time, the area hard drive marked as “free to rewrite.” If desired, using recovery programs deleted files can be successfully restored. It depends on the time that has passed since the deletion. Erase (permanently delete) data with standard using Windows impossible. But you can do this using the “Wipe Free Space” tab. To erase, check the “Wipe the free space” option and select the disks to destroy information.

Section “Other Privacy Utilities”

“AutoStart programs” tab. Programs launched when booting Windows. If you do not know the purpose of a particular program, it is better to disable it (the “Disabled” button).

“IE Extensions” tab.

When installed, some programs are seamlessly integrated into Internet browser Explorer. Spyware can be disguised as an extension. Most reliable way- disable or remove all add-ons. Not only will this not stop the browser from working, but it will even load faster. If you know what's what, leave the most useful add-ons enabled.

“Internet Explorer” tab.

Browser settings that affect browser privacy: autocomplete, passwords, etc.

After you have marked the desired options, you need to go back to the top “Overview” section and click the “Wash My Computer” button to erase the marked personal data. The “Wash” tab displays the removal process.

Thus, almost all functions Total programs Privacy we have listed. The matter is up to you. Finally, you can go to the settings (“Settings” section) and set the program to autoload from Windows. Then the process of deleting confidential information will be automated.

Hello, dear friends!

We are pleased to present for your review next update LPgenerator platforms. This functionality will bring enormous opportunities for those who want to process lead data in a third-party service with which there is no standard integration.

Using Webhook technology, lead data can be sent to any third-party resource immediately after receiving it, in the form of a string in special format JSON, generally accepted on the Internet. And it will look something like this:

In other words, you now have access to independent integration with almost any service that can receive and process lead data sent to it. All you need is to configure the transfer of data to the recipient address using Webhook, and organize the processing of this data on the recipient's side.

If your system is self-written, then you yourself (or your developer) know how to work with data on your side. In other situations, we recommend contacting our service technical support service to which you want to transfer data - since here you will need knowledge of the characteristics of the receiving service.

Let's look at sending data using an example specialized service for testing webhooks, “Request Catcher”. It will act as a server that receives and processes lead data, this will help you understand how the technology works.

1. Go to the following link . A form will open in front of you where you should enter the desired name of the subdomain; it will be highlighted specifically for your tests. After that, click “Get Started”:

2. In our example, the address was “lpgenerator.requestcatcher.com”. Copy it, go to the page conversion optimization center and in the integration list click on the “Webhook” button:

3. In the pop-up window, click the blue “Add webhook” button:

5. If you need to transfer some data along with the request, you can enter a parameter and value in the “Additional fields” section. For example, you can add there The secret key so that your server can check the origin of the request:

7. Open the landing page for which integration was configured and try to send a lead, and then return to the browser tab with Request Catcher. If everything was done correctly, you will see the request text with the lead data, as well as extended information about him:

This is the form in which the data will be sent to the third-party resource. For the technology to function correctly, you should make sure that the receiving party is capable of processing data in this form. If you are not sure about this, we recommend contacting the technical support of a third-party service to clarify this information.

At this point, the setup can be considered complete. Now you can independently integrate with your favorite services and manage lead data from there. And most importantly, all this can be done in just a couple of clicks and absolutely free!

For all questions, be sure to write to us at “ ”, or call on Skype (our login: lpgenerator) from 11 to 19 Moscow time (except holidays and weekends).

We wish you high conversions!

Sincerely,
LPgenerator command.

In the last article I wrote about visiting blocked sites. I decided to continue a series of articles on browsers, and today I will write about how to clear history, cache, cookies and other information in the Opera browser. There seems to be nothing complicated there, but for many such instructions will be useful. I don't know about you, but I Opera browser I’ve been using it for a very long time, probably since I started using the Internet. Therefore, first I’ll tell you about solving various issues with this browser.

In the Opera browser, you can clear not only the history of visited sites, cache and cookies. There is also a download history, passwords, a history of auto-filling forms, and some data from third-party services. Let's first understand what it is and why clear this data in the browser.

  • Visit history. Everything is very simple here. The browser always remembers the sites you visit. Every page. You can watch this story later. Sometimes this can be very useful. But, there are times when we need to clear history in Opera. For example, when we surf the Internet from someone else’s computer. I'll tell you a secret that in this case, it is better to use " Private browsing". "Menu" - "Create private window" In that Opera mode does not remember browsing history and other information.
  • Download history. History of files that we downloaded from the Internet through a browser.
  • Cache (cached images and files). These are different elements of websites that the browser saves so that the next time you visit the site it does not download these files again. And the site is already opening much faster. Clearing the cache can be useful in cases where, for example, the site is not displayed quite correctly. Or updated information is not displayed on the site. Sometimes, due to the saved cache, the router settings do not even open or are not displayed. In this case, you just need to delete the cache and the browser will reload up-to-date information from the site.
  • Cookies. No, this is not a cat from the SlivkiShow channel :). IN browser cookies, this is a small piece of data that the browser receives from the site, stores it, and sends it back when visiting the site. Thanks to cookies, we don’t need to log in to sites every time or set any settings in different services and social networks, re-add products to the cart in online stores, etc. Be careful, if you clear cookies in Opera, you will most likely have to log in to the sites again and set some settings.
  • Passwords. Everything is very simple here. These are passwords from different sites to which you logged in using your data.
  • Data for autofilling forms. When we fill out some forms, Opera remembers the information we enter, and when we fill out these forms again, it offers us the saved options. This is very convenient, I often use this feature myself. So, you can clear this information if necessary.
  • Data from third party services. Many people advise clearing this data when problems appear in VPN work in Opera.

What we have figured out is that it’s time to move on to clearing the data we need in the Opera browser.

Opera: delete history, cache, cookies, passwords, form data and third-party services

Everything is very, very simple. Open Opera and click on the "Menu" button in the upper left corner. Hover your mouse over "Other elements" and select "Clear browsing history". Or press the keyboard shortcut Ctrl+Shift+Del.

A small window will immediately open. First of all, in the drop-down menu, select for what period you want to clear the data (behind last hour, day, week, 4 weeks, entire period). Then check the boxes that need to be cleared. Above I described each point in detail. And to clear it, click on the “Clear browsing history” button.

All data will be completely cleared.

Another way you can delete your browsing history in Opera

I don’t know if it will be useful to you, but you can also clear the history through various programs to clean the system of garbage. The most popular is probably CCleaner. On the "Applications" tab, you can select items that need to be cleared in the Opera browser.

There you can also clear history from other browsers, and clean Windows from unnecessary files. But watch carefully with this program. Especially with the "Registry Cleaner" section. Don't get too carried away.

These are the tips. I hope you found this article helpful. Best wishes!

Hosting resource usage statistics

Each RU-CENTER virtual hosting service keeps records of the use of the following resources:

  1. RAM- the size of the allocated memory for running the software on the hosting, set in megabytes in accordance with the tariff plan.
  2. CPU time- time in seconds that the server processor spent executing a task, for example, a website script. The limit value is 50% for CPU time in tariff plan means that over a period of 1 minute, the script can fully utilize 1 CPU core for 30 seconds. The 200% limit means that for a period of 1 minute it is permissible to use 2 processor cores, that is, 120 seconds of processor time.
  3. Number of disk operations- the number of I/O operations performed by the storage system per minute.
  4. HDD reading - speed of reading information from the server disk, megabytes per minute.
  5. HDD recording- speed of recording information to the server disk, megabytes per minute.

Information on the use of resources is posted in the section ResourcesStatistics .

Clicking on the chart takes you to detailed information on using a separate resource:

When you hover your cursor over a point on the graph, you will see resource consumption at that point in time.

Reasons for increased resource consumption

If the established tariff limits are exceeded, contact email contract, a notification is sent about the need to analyze the situation and take measures to reduce the load on the hosting.

Main reasons increased consumption resources:

  1. Using a resource-intensive CMS, for example 1C-Bitrix. Choose.
  2. High site traffic. In this case, we recommend switching to or.
  3. Unoptimized scripts on the site- scripts whose execution algorithm is ineffective. For example: calculation of known data, non-optimal calculation methods, unnecessary cycles, etc.
  4. Unoptimized queries to the database MySQL data . Problems can arise due to incorrectly formed indexes, large volumes of selected data, large query nesting, etc.
  5. Search robot activity. Robots can slow down a site if there are many of them and they are crawling simultaneously to update their search database.
  6. Malicious code on the site. The load on the server may be caused by malicious scripts running on the hosting.

Ways to reduce resource consumption

1. Disable unused Apache web server modules and PHP module extensions

By default, Apache modules are enabled on the hosting: auth_module, cgi, realip_module, rewrite_module, autoindex_module, env_module, expires_module

Check if you have enabled following modules Apache and disable them: for most sites to work on PHP And MySQL they are not required. This can be done in the section
Control web serverPHP module management hosting control panels. To view the list of modules, click on the link Manage Extensions.

  • FastCGI- required if you independently install any software, running as a FastCGI server.
  • gzip_module- required if you configure gzip compression. In addition to enabling the module, additional compression settings in the file are required .htaccess. Disable the module if you do not use this functionality.
  • mime_magic_module- allows the web server to determine mime types of files; for most sites, a standard mime_module is sufficient.
  • Perl- aka mod_perl, required for the operation of Perl scripts specially written for mod_perl. To run Perl scripts in most cases the module is used CGI(see article)
  • proxy_module- required if you plan to configure proxying of requests using the apache web server.
  • bandwidth_module, usertrack_module, speling_module, limitipconn_module- these modules consume a small amount of memory, but most sites do not need their functionality, so they can also be disabled.

PHP module extensions are managed in the hosting control panel section Control web serverPHP module management in accordance with the instructions.

  • Accelerator, APC- cache data in random access memory, so they require a large amount of it. On virtual hosting RAM is not enough for efficient work these modules.
  • mysql, mysqli, pdo_mysql- modules for working with the MySQL database, usually the site requires one of them, disable the unused ones.
  • imagick, gd- modules for working with graphics, if the site can work with the gd library, it is better to use it, since it consumes significantly less memory.
  • imap- allows you to work with mail servers By imap protocol, most sites do not require this feature.
  • dba, sqlite, pgsql, pdo_sqlite, pdo_pgsql- modules for working with the corresponding DBMS. Most sites work using the MySQL DBMS; these modules can be disabled.

If you are not sure whether a particular module is needed for the site to work, you can analyze the impact of a particular module on the site’s operation by disabling them one by one and checking the sites’ correct operation.

2. Analyze the site’s log files

On hosting, log files are located in the /var/log/ directory:

  • /var/log/your_domain.access.log – log of requests to the site,
  • /var/log/your_domain.error.log – error log.

You can view them when connecting to hosting via . You can download log files using file manager control panels. You will be able to see what requests were made to the site during moments of high memory consumption.

Site indexing search robots, especially several at the same time, a jump in traffic - all this causes an increase in memory consumption. Some search engines allow you to limit the intensity of your robots’ requests per unit of time. Information about these settings can be found in the documentation of these search engines.

3. Check the operation of site scripts with third-party servers

If your site receives data from third-party services, their slowdown or unavailability may impact your site's performance. The slower a third-party service responds, the more time processes spend in RAM Apache.

4. Analyze the operation of site scripts and queries to the MySQL database

Script optimization should aim to minimize RAM usage and the time required to execute the script. Cache data that is rarely updated.

We recommend consulting with site developers regarding optimizing SQL queries. The faster queries are executed by the database server, the faster the web server will receive the necessary data, generate a response to the client, and free up memory.

To view the database queries that arise when accessing the site and their execution time, you can use the interface, tab Processes.

Optimizing database queries should be reduced to the following results:

  • all queries use indexes to select data,
  • minimized use temporary files and filesort operations.

All this data for each of the requests can be obtained using the command EXPLAIN according to MySQL documentation.

5. Analyze the site layout

We recommend optimizing the site layout by reducing the number of loaded elements. The fewer requests to the server, the lower the total request processing time and the number of running web server processes, and, therefore, the lower the memory consumption.

6. Check the site for malicious code

Most sites built on the basis popular CMS, have certain security vulnerabilities. Developers regularly release updates to eliminate vulnerabilities, but it is not always possible to protect against hacking. This is due to the fact that hacking most often occurs through third-party plugins or modified themes.

Check your hosting for availability malicious code by using .

At the beginning of December, the long-awaited release of the desktop version took place mail client Spark for macOS. This application is popular on iPhone and iPad due to its attractive design, all the necessary (but not redundant) functionality, as well as a large number of popular options such as pinning important letters, a smart inbox, read receipts, and so on. Apple quickly added Spark for macOS to the list best apps year in Mac App Store, which only added to the popularity of this email client. Personally, I use Spark on iPhone, iPad Pro, and since the start of beta testing of the desktop version, I have abandoned the “heavy” AirMail on Mac. However, the free email client with user-friendly interface and excellent functionality still have pitfalls. Developer Vladimir Shabanov on Facebook drew users' attention to Spark's privacy policy.

Why free unofficial ones are dangerous email applications like Spark? Because they get access to all your letters outside of your laptop, iPhone and gmail on their server - and when it is hacked, most of your accounts in stores, social networks, payment systems, dating, bookings, steam and dropboxes will also be hacked. And the companies that develop these apps have no incentive to invest in security because they don't charge you for the app.

In order not to copy too much large text with background, tips and conclusions, we recommend read about Spark in the publication of Vladimir Shabanov. And at iG, we asked ourselves: what is the actual situation with the collection and storage of user data when using third-party email clients? To do this, we looked into the “Privacy Policy” sections that are unpopular among most users and selected from there the main facts that you need to know when using third-party email clients on Mac. Briefly we're talking about that almost all applications send user data, including addresses, to developer servers Email, in some cases, passwords, email texts, contact lists, calendar data and various anonymized data. And some applications even collect device information, phone numbers, location, or completely copy all data available in the email account to the server. We also asked Yandex and Mail.ru regarding the collection of user data and letters when working with accounts of third-party services and the mechanism for sending push notifications about new letters, but company representatives were unable to promptly respond to the editor’s request.

Of course, every developer claims that user information stored on reliable servers like Amazon Web Services, and they all take some additional protective measures. However, is it necessary to say that we are not talking about one hundred percent security? While the largest and most reliable Internet companies sometimes leak user data, relying on the protection of small startups would be reckless. On the one hand, you can brush off all threats under the pretext that there is no secret data in your mail, but do not forget that even in the most boring mailbox there is a lot of interesting things for attackers. Nowadays, the email address serves as a key identifier to which accounts of payment systems, social networks, various sites and services are linked, and in some cases the email password matches other accounts, which increases the possible damage from hacking. Simply put, you cannot be careless when choosing an email client, and when using third party software It is imperative to understand exactly what data you are transmitting to developers.

Spark


1. In addition to impersonal statistical information When using the application, you may be asked to provide some personal information.
2. The first email address that is added is used as the username. It may send you emails with information about new features, updates, announcements, and requests to provide feedback on your use.
3. Spark servers are used only to deliver push notifications and in some cases send emails.
4. Accounts are added using OAuth authentication if possible. Otherwise, addresses and passwords are stored on an Amazon cloud server Web Services.
5. In addition to Amazon Web Services security policies, Spark uses a number of measures to prevent third parties from accessing data, as well as HTTPS protocol and asymmetric encryption of account data.
6. Spark uploads the subject and part of the email to the server to send the push notification and deletes this data immediately after the notification is delivered. Messages are stored encrypted on the server.


1. The mail client may request the voluntary transfer of data such as name, email address, phone number and bank card.
2. Polymail collects and stores data about usage scenarios of the application and its functions, as well as mobile devices on which it runs, including: operating system, smartphone or tablet model, unique device identifiers, information mobile communications and phone number.
3. When using Polymail, developers can collect information about the user's location, IP addresses, GPS data, as well as information from other sensors of the mobile device.
4. Polymail collects and stores information about the contacts of users with whom you exchange letters. This data is used to improve the service.
5. Polymail collects and stores information about sent emails (subject and attachments) to provide read receipt functionality.
6. To improve the Polymail service, we index letters: the date the message was received, folders and sender names.
7. Cookies and other anonymous identifiers are collected and stored by Polymail and its partners.


1. Postal Airmail client does not collect or store emails on cloud servers. When using options such as Snooze Sync, all necessary data is synchronized directly between devices.
2. Airmail collects and stores data such as Cookies, anonymized information about application usage scenarios and email addresses.
3. Cookies are collected and used only for the purpose of identifying the user to save settings and to provide the services required by the user.
4. In some cases, access to data collected and stored on servers may be provided to certain employees associated with the work of Airmail: administrators, sales specialists, marketers, lawyers.
5. User data is collected to operate Airmail, as well as for the following purposes: interaction with third parties social networks and platforms, contact management and messaging, analytics, remarketing, behavioral targeting, commercial purposes, payment processing, customer support and feedback.


1. If the account does not support OAuth authentication, the login and password are stored on the AWS cloud server.
2. On cloud servers emails are downloaded to send push notifications.
3. Emails are downloaded within the last 14 days on mobile devices and 60 days on Mac.
4. Newton receives and stores information from our partners about users who send you email.
5. To use the Read Mark feature, Newton collects and stores data about sent emails.
6. Newton promises that it will not sell or transfer to third parties. personal information, and also uses the HTTPS protocol and additional tools protection when transmitting data to AWS servers.


1. Using the Canary email client does not provide access to users’ personal data and transfer it to cloud servers.


1. When creating an account, Nylas N1 collects and stores personal data, such as email address, first and last name, which can be used for identification.
2. When using the application, Nylas N1 collects and stores account information and associated passwords.
3. By entering your email account information you agree to grant Nylas N1 the rights to make a copy of all content mailbox, calendar and contact list.
4. Nylas N1 also uses automated data collection tools such as Cookies and Web Beacons.


1. Mail, calendars, files, contacts, settings and other data from it will be automatically synchronized with the device via a cloud server.
2. Outlook stores data on Microsoft servers for support additional features, such as quick search, personalized filtering of less important mail and adding attachments from linked storage providers.


1. On the official website of the application, the information in the “Privacy Policy” section applies only to the operation of the Unibox website itself. There is no information about the collection and storage of personal and anonymized data when using the Unibox email client.