"Browser-only" is a phrase competitors use loosely. Three technical criteria define what it actually means, a 30-second DevTools check verifies it, and the difference matters for everyone — not just developers.
"Browser-only" is the kind of phrase that means whatever the marketing team needs it to mean. Competitor sites advertise "runs in your browser" while uploading every input to a backend for "processing," which is a fancy word for logging. The phrase has become so debased that this article needed to be written to define it properly.
The good news: it's actually simple to verify whether a "free online tool" is browser-only or not. The bad news: a lot of sites you've used aren't.
What "browser-only" actually means
Three technical criteria. All three must be true for a tool to genuinely be browser-only:
- No upload of the user's input. When you paste JSON into a JSON formatter, the JSON itself never leaves your browser tab. It is parsed and re-formatted by JavaScript that runs locally. If the tool needs to send your input to a server to format it, it is not browser-only.
- No telemetry of what the user is doing. Even if the input doesn't leave, some sites report back "user clicked Format button at 14:23 UTC, document was 18kb, formatting took 122ms." That's behavioural data and it still creates a profile. A genuinely browser-only tool reports nothing back about your interactions.
- Computation happens client-side. The full logic of the tool lives in JavaScript that downloads once with the page. If part of the logic requires calling a backend service, the tool is at best partially browser-only and you should know which parts call out.
That third criterion is where exceptions get interesting. A currency converter genuinely cannot run browser-only end-to-end, because today's exchange rates live on a server somewhere. The honest move is to disclose: "this tool fetches current rates from openexchangerates.org; your conversion amount is computed locally." That's a reasonable hybrid. What's not reasonable is hiding the fact that anything goes back to a server.
How to verify in 30 seconds
Open the tool in Chrome or Firefox. Press F12 to open DevTools. Switch to the Network tab. Click the "Clear" button (the circle-with-line icon). Now use the tool — paste your input, click whatever button does the work.
Watch the Network tab. A browser-only tool will produce zero new requests after the initial page load. The list stays empty.
A non-browser-only tool will fire one or more requests every time you click. The most common patterns:
POST /api/formatwith your JSON document in the body — direct uploadPOST /analytics/eventwith metadata about what you did — telemetryGET /track.gif?event=tool_used&hash=…— old-school tracking pixel, still alivePOST /log/errorfiring on every keystroke — supposedly for "improving the tool," actually logging your input character-by-character
This isn't a hypothetical. Spend 10 minutes auditing "free online JSON formatters" with DevTools open and you'll find half of them sending your JSON somewhere. The ones with the slickest UIs and most aggressive SEO are usually the worst.
Where competitors fail (the patterns, not the names)
Four common failure modes in the "free online tools" space:
- Pattern A — full upload, server-rendered. Your input goes to the server, formatting happens there, the formatted output comes back. Used by competitors that started life as a PHP script in 2008 and never refactored. Easy to spot: turning off your network kills the tool.
- Pattern B — "client-side" with phone-home telemetry. The tool runs in the browser, but every interaction is logged. The data isn't your input, it's about your input — document size, click timestamps, browser fingerprint. Still creates a profile.
- Pattern C — "anonymous" analytics that aren't. The tool uses Google Analytics, Segment, or similar with default settings. By default these send page URL + referrer + IP + user agent. Combined with the URL containing your tool query, it's a behavioural record stored in someone else's database.
- Pattern D — third-party widget exfiltration. The tool itself is browser-only, but the chat widget / cookie banner / "share" button on the page calls out to its own servers with full page context every time. The user sees the tool form. The third-party JS sees everything.
Pattern D is the trickiest because the tool maintainers themselves often don't realise what their embedded widgets are doing. A "no-cookies privacy promise" on a site running Intercom Chat is mathematically false even if the tool author meant well.
Why this matters for non-developers too
The audience for "free EXIF viewer" or "free JSON formatter" is often not a developer. It's a journalist scrubbing photos before publication, a real-estate agent checking a property listing, a parent investigating a school's data-handling claim. They don't know to open DevTools.
Three concrete examples where the browser-only distinction matters for non-technical users:
- Receipt photos for tax purposes. Upload a phone photo of a restaurant receipt to a "free EXIF viewer" and you might have shared GPS coordinates of the restaurant (and yourself), camera model + serial, time of meal. Some "free" services keep that data for "research purposes." A browser-only tool like EXIF Stripper reads the same data without it leaving your device.
- Sensitive JSON. API responses pasted into a formatter often contain access tokens, internal IDs, customer names. A backend-rendered formatter has the full payload in its logs forever. A browser-only formatter doesn't.
- Generated passwords. A "free online password generator" that runs server-side has, by definition, seen every password it generated. Some sites store this for "research" on password patterns. A browser-only generator like password generator uses the browser's
crypto.getRandomValues()and nothing leaves.
For most everyday users none of these individual leaks is catastrophic on its own. The issue is the aggregate. Hundreds of small data leaks over years build the digital exhaust trail that gets used in advertising, insurance pricing, sometimes worse.
The unavoidable exceptions
Some tools genuinely cannot run browser-only and that's fine — as long as the exception is documented:
- External data lookups. Currency rates, VAT rate tables that change quarterly, weather data, time zones around DST transitions. These require fetching authoritative data from somewhere.
- External resource fetching. A YouTube thumbnail tool needs to fetch the image from YouTube's CDN. The user's URL goes to YouTube (where it would go anyway if they clicked the video).
- Computation too heavy for browsers. Large file processing, ML inference at scale, video transcoding. These genuinely need server compute.
The honest pattern for hybrid tools is: do the part that can run locally, locally; document what calls out, and to whom. Toolhub's YouTube Thumbnail tool fetches one image from YouTube's CDN and otherwise stays browser-only. That's disclosed on the tool's help block. The line is between "discloses the exception" and "buries it in unread terms-of-service."
What Toolhub commits to specifically
Five concrete commitments any visitor can verify:
- No analytics on tool pages. No Google Analytics, Plausible, Fathom, Matomo, or equivalent. (The optional Cloudflare Web Analytics integration is gated behind config that ships disabled.)
- No third-party widgets that phone home. No Intercom Chat, no Drift, no Tidio, no Crisp.
- No tracking pixels, no fingerprinting libraries, no behavioural logging.
- Tool computation happens in the browser. Exceptions are documented on each tool's help block.
- The full source code is on GitHub for anyone to audit.
You don't have to take any of that on trust. Open DevTools, watch the Network tab, use any tool, and confirm. If we ever start sending data we shouldn't, it's visible.
The architecture pattern that makes browser-only possible
For developers reading this: browser-only as a site philosophy is enabled by a small set of technical choices that compound. Worth listing because the pattern is reusable:
- Static HTML + JavaScript, hosted on a CDN. No application server. The hosting provider sees page requests but never user input. GitHub Pages, Cloudflare Pages, Netlify, and equivalent platforms all support this model.
- JavaScript that uses standard browser APIs. File API for uploads, Canvas for image work, Web Crypto for hashing/random, IndexedDB for local persistence. All of these run in the user's tab. None require a server.
- Service Workers for offline operation. Once a Progressive Web App is installed, the tools work without any network connection at all. This is the strongest possible proof that "no data leaves" — there's nowhere for it to leave to.
- Build-time pre-rendering instead of runtime templating. Each page is generated at build and served as static HTML. There's no Node.js process accepting requests, no Python interpreter waiting to run a template, no database connection pool. No infrastructure to leak data through because none exists.
The reason most "free online tools" sites aren't browser-only is path dependency, not technical limitation. They started life as a server-rendered PHP script or a Rails app, accumulated database logging "for debugging," and never invested in the refactor. The model continues working for the operator (who gets data + analytics) and works less well for the user (who gets their data logged).
Rebuilding for browser-only takes effort. The result is operationally cheaper (no database to maintain, no backups, no API rate limits to manage) and morally cleaner (no data to leak even if breached). For new tool sites starting today, browser-only is the default modern choice.
The verification habit
Make the 30-second DevTools check a habit for any new "free online tool" you adopt. The sites that fail it aren't worth using when alternatives exist, and they always exist. The pattern of "free, frictionless, and quietly logging everything" is the dominant model online — but it's a choice, not a physical law of the internet.
For further reading, the EFF's privacy resources and Mozilla's MDN privacy reference both cover the technical mechanics of browser tracking in more depth than fits in any single article.
Browser-only is a small commitment that turns out to have large compound consequences for the digital trails users leave behind. It's worth defending — both as a site policy and as a user habit when choosing tools.
← All articles