What is ThreatNet and is it anonymous?
See it as banding together and watching each other’s back. When the CounterSpy real-time security checkpoints are breached by unknown applications, CounterSpy will ask you if it’s acceptable to forward information on the software to ThreatNet. This data is associated to an anonymous TRUST ID, and includes basic file and setting data of the application file(s) that breached the security checkpoint. All contact to ThreatNet occurs only with your permission, giving you the option to completely disable ThreatNet communication, or choose to send data to ThreatNet only for specific breach reports. Sunbelt Software will never use any personal or aggregate information for marketing or non-stated purposes.