Editorial Policy & Corrections
Security Advisor Hub is an independent evaluation publication. This policy explains how we research, how we write, how we handle disagreements, and how we correct mistakes — transparently.
Our editorial principles
Our job is to help readers make decisions in moments where trust and risk matter. We do that by separating facts from interpretation and making trade-offs explicit.
Independence & affiliate relationships
We may earn commissions through affiliate links — and that never determines scores, rankings, or inclusion.
Affiliate partnerships help fund research and updates. They do not buy influence. Our methodology is published so readers can see how evaluations work.
How we research
We prioritize primary sources and documented facts. Where something is uncertain or changes frequently, we label it as such and avoid overconfident conclusions.
Typical inputs we use
- Provider documentation: privacy policy, terms, feature docs, protocol support.
- Verification signals: independent audits, transparency reports (when available).
- Pricing terms: renewal rates, refunds, trial details, device limits (where disclosed).
- Platform coverage: OS support, router support, app maturity and update cadence.
- Secondary signals (cautious): large-scale public sentiment (app stores, Trustpilot), used as context — not a primary score driver.
How we write: facts vs interpretation
Reviews combine two layers: what’s verifiable and what it means for a decision.
When we make recommendations, we signal the difference between documented facts (e.g., policy language, audit existence) and editorial interpretation (e.g., “best for switching” based on trade-offs and scenario weighting).
Interpretation: That improves confidence for “privacy-first” buyers — depending on scope and freshness.
Updates & “Last reviewed”
Security tools change quickly. We maintain pages with an update cadence and visible freshness signals so you can judge recency.
- Policy or terms changes (privacy, logging, refunds, renewals).
- Major feature changes (protocols, kill switch behavior, platform support).
- Meaningful pricing changes or plan restructuring.
- Material incident disclosures or notable trust changes.
- Scenario performance changes (e.g., access reliability) when verified by multiple signals.
Corrections, clarifications & disputes
We take accuracy seriously. If something is wrong, we want to fix it fast — and visibly.
- Send the page URL and the exact statement you believe is incorrect.
- Include supporting source links (official documentation preferred).
- Explain what the correct statement should be (and why).
- We review the evidence and update the page if warranted.
- If we correct something material, we add a note indicating what changed.
- If we disagree, we may clarify wording, add context, or explain our reasoning.
Scope & limitations
We provide information to support decisions — not legal, financial, or individualized security advice.
Security depends on your threat model, device hygiene, configuration, and risk tolerance. We aim to be clear about what can be known publicly and what cannot.
Want the full methodology?
See exactly how our rubric scoring and scenario weighting works — and how to interpret tags and rankings.