Privacy Tools Guide

Privacy-Focused Period Tracker Alternatives

Most popular period tracking apps — Clue, Flo, Glow, Natural Cycles — are data companies with wellness branding. They collect detailed menstrual, sexual, and reproductive health data, then monetize it through advertising, insurance partnerships, and data broker sales. In a post-Dobbs legal environment, this data has been subpoenaed and shared with law enforcement.

This guide covers the alternatives worth using, ranked by privacy strength.

Why Switch Now

The FTC took action against Flo Health in 2021 after it shared user health data with Facebook and Google despite explicit promises not to. Glow was found to expose sensitive data via API endpoints without authentication. Clue, while better-regarded, is VC-funded with a business model that depends on data utilization.

Beyond corporate data practices, US state laws have changed the risk calculus. In states where abortion is legally restricted, documented menstrual cycles and missed periods constitute evidence that prosecutors have sought via subpoena. Several fertility apps complied with these requests without notifying users.

The consequence is simple: if you don’t need the data stored in the cloud, don’t store it there.

Tier 1: Local-Only, Open Source

Drip — Best Overall

Platform: Android (F-Droid + Google Play), iOS Source: Open source (GitHub: bleeding182/drip) Data storage: Device-only, no account required Cost: Free

Drip tracks cycles, symptoms, and predictions entirely on-device. There is no backend, no account, and no network requests during normal use. The source code has been reviewed by independent security researchers.

Features:

Threat model: Safe against corporate data sharing, data broker sales, and warrant-based law enforcement requests targeting the app provider. Data is only at risk if your device is physically seized.

Euki — Best for High-Risk Jurisdictions

Platform: Android, iOS Data storage: Device-only Organization: Ipas (reproductive health nonprofit) Cost: Free

Euki was specifically designed for people in legally hostile environments. It includes:

Threat model: Equivalent to Drip with additional UX protections for physical threat scenarios.

Tier 2: Open Source with Optional Self-Hosted Sync

Periodical (iOS)

Local storage, no account, minimal permissions. Less feature-rich than Drip but trustworthy for basic cycle tracking on iOS.

Bluem / Sympto

Sympto (sympto.org) offers a web-based cycle tracking tool where you control the data. Self-host it on your own server for full ownership:

# Self-host Sympto with Docker
docker run -d \
  --name sympto \
  -p 3000:3000 \
  -v /opt/sympto-data:/app/data \
  sympto/sympto:latest

Access at http://localhost:3000. No third-party server ever touches your data.

What to Avoid

Apps with these data practices

Check any app against these red flags before trusting it:

# Audit Android app network traffic with mitmproxy
# Install mitmproxy on your laptop
pip install mitmproxy

# Set your phone's proxy to your laptop IP:8080
# Use the app for 10 minutes
# In mitmproxy web UI (port 8081), look for:
# - Third-party analytics domains (firebase, mixpanel, amplitude)
# - Advertising endpoints (doubleclick, facebook, googleads)
# - Health API endpoints sending your data

mitmweb --listen-host 0.0.0.0 --listen-port 8080

Red-flag domains to watch for:

A period app with any of these is sending your health data to third parties.

Hardening Android Permissions for Any Tracker

If you must use an app that isn’t fully offline, strip every unnecessary permission:

# Find the app package name
adb shell pm list packages | grep -i "period\|cycle\|flow\|clue\|flo"

# Revoke permissions
APP="com.example.tracker"

adb shell pm revoke $APP android.permission.ACCESS_FINE_LOCATION
adb shell pm revoke $APP android.permission.ACCESS_COARSE_LOCATION
adb shell pm revoke $APP android.permission.READ_CONTACTS
adb shell pm revoke $APP android.permission.GET_ACCOUNTS
adb shell pm revoke $APP android.permission.READ_EXTERNAL_STORAGE

# Block network access with NetGuard (F-Droid)
# Or use a firewall app that allows per-app blocking

On iOS:

Settings > Privacy & Security > Tracking — deny tracking
Settings > [App Name] > Location — Never
Settings > [App Name] > Contacts — off
Settings > Health — restrict what the app can read/write

Data You Should Never Enter

Regardless of which app you use, these fields should never contain real information if you have any privacy concern at all:

The app needs none of this to track your cycle. If it requires it, that’s the answer.

Migrating Away from Flo or Clue

Before deleting your account, export your data and submit a deletion request:

  1. Export first: Flo — Settings > My Data > Export. Clue — Settings > Export Data.
  2. Submit deletion: Use the in-app deletion option, or email their privacy team.
  3. Invoke CCPA/GDPR: State explicitly you’re invoking deletion rights and want confirmation.
  4. Import into Drip: Drip supports CSV import for historical cycle data.

Built by theluckystrike — More at zovo.one