We live in a quantified age. More information than ever is collected, shared, and analyzed about who we are, where we are, what we choose, why we choose, and when we’re most likely to choose again. Consumer awareness lagged behind data gathering for years – but every social network policy change or major company data breach brings more attention to the cause of privacy and data management.

And that’s where you come in. If you have ideas about how to make the web a more transparent place, or for tools that help users manage what they share.

The world needs you. Hack the Trackers brings together like-minded technologists to put these ideas into action. Join us in NYC or online for a two-day hack event to make data management transparent, accessible, and compelling.


  • Participants: Individuals (over 18 years in age)


  • Categories: online Privacy & Security apps and extensions.
  • What to create: functioning software application; demonstration video; screenshots
  • Platforms: iOS; Mobile Web; Web; Mac Desktop; Windows Desktop

Hackathon Sponsors


$3,116 in prizes

Blackphone BP1 (4)

The high-end smartphone which puts privacy and security ahead of everything else.

Ghostery Prize Pack (4)

Ghostery merchandise prize pack consisting of tees, stickers, and other Ghostery schwag.

Devpost Achievements

Submitting to this hackathon could earn you:


Brian Stoner

Brian Stoner
Front-End Engineer, DuckDuckGo

Daniel Ford D.SC.

Daniel Ford D.SC.
Chief Security Officer, Blackphone/Silent Circle

Mike Connor

Mike Connor
Director of Partner Engineering, Mozilla

Marshall Moutenot

Judging Criteria

  • Is the hack compelling?
    The hack should reach the lion’s share of web users in the general public; not exclusively those who are already privacy experts.
  • Is the hack usable?
    Judges will evaluate the hack’s ease of adoption and use.
  • Is the hack ready?
    Judges will evaluate the degree of the hack’s completion towards a fully developed product.
  • Does the hack further the cause?
    The judges are experts in their field who are well aware of the online privacy movement and other tools available; they will consider the uniqueness of approach and overall effectiveness of the hack in the context of the greater privacy ecosystem.

Tell your friends

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.