Overview: Unmasking Surveillance in Creative AI
At Voss Neural Research, we don't just audit platforms — we dissect them. Our latest comparative forensic audit targets four heavyweights in the creative AI space: Suno, ElevenLabs, Midjourney, and Udio. Using our proprietary Antigravity Forensic Engine and VOSS Protocol, we've captured, parsed, and analyzed HTTP Archive (HAR) data to expose the hidden surveillance mechanisms these platforms deploy.
This isn't about features or user experience — it's about what's happening under the hood, behind the curtain of "free" or "freemium" services. The results are stark. While all platforms exhibit some level of data collection, one stands out as a surveillance juggernaut. If you're using these tools to create music, art, or voiceovers, you're also feeding a machine that may be harvesting far more than your prompts.
Master Comparison Table
Our audit hinges on hard metrics extracted from live HAR captures. These numbers aren't guesses — they're forensic evidence of how these platforms behave in real-world usage.
| Metric | Suno | Udio | ElevenLabs | Midjourney |
|---|---|---|---|---|
| Total Requests | 2,104 | 357 | 87 | 48 |
| POST Requests | 1,308 | 188 | 38 | 11 |
| POST Ratio | 62.2% | 52.7% | 43.7% | 22.9% |
| POSTs / min | 37.3 | 9.8 | 30.5 | 20.7 |
| 3rd-Party Domains | 17 | 3 | 1 | 3 |
| Trackers Detected | 24 | 6 | 4 | 5 |
| PII Leakage (entries) | 600 | 32 | 26 | 8 |
| Proxied Analytics | 203 | 22 | 13 | 0 |
| Upload (exfil) | 3.82 MB | 0.4 MB | 0.27 MB | 0.03 MB |
| Download | 110.07 MB | 4.22 MB | 0.82 MB | 7.55 MB |
| Capture Duration | 35.1 min | 19.2 min | 1.2 min | 0.5 min |
Suno's numbers — 2,104 requests, 62.2% POST ratio, 17 third-party domains, 600 PII leakage entries — scream surveillance overreach. Compare that to Midjourney's lean profile (48 requests, 22.9% POST ratio, 0.03 MB upload), and it's clear we're dealing with vastly different beasts.
Threat Ranking: Who's Watching You?
Based on our analysis, we've ranked these platforms by their privacy threat level. This isn't about usability or output quality — it's about how much of your data they're siphoning and who they're sharing it with.
- ⛔ CRITICAL Suno — POST Ratio: 62.2% | 3rd-Party Domains: 17 | Trackers: 24 | PII: 600 entries
- 🔴 HIGH Udio — POST Ratio: 52.7% | 3rd-Party Domains: 3 | Trackers: 6 | Mixpanel IP capture
- 🟡 MEDIUM ElevenLabs — POST Ratio: 43.7% | 3rd-Party Domains: 1 | PostHog adblock evasion
- 🟢 LOW Midjourney — POST Ratio: 22.9% | 3rd-Party Domains: 3 | Standard analytics
⛔ Suno: A Surveillance Juggernaut
Suno isn't just a creative AI platform — it's a data-harvesting machine. Our audit reveals an unprecedented level of surveillance infrastructure, with a staggering 2,104 total requests over a 35.1-minute capture, 62.2% of which are POST requests (1,308). That's 37.3 POSTs per minute, a clear indicator of aggressive data exfiltration. Suno connects to 17 third-party domains and embeds 24 distinct trackers, including heavyweights like Tapad Identity Graph (484 requests) and TikTok pixels (203 requests).
Suno's 600 PII leakage entries expose sensitive user data — including email,
first_name, last_name, phone, and user_id —
across endpoints like auth.suno.com and studio-api.prod.suno.com. This is
a direct privacy violation at industrial scale.
Then there's the proxied analytics: 203 disguised POSTs to endpoints like
analytics.tiktok.com/api/v2/pixel/inter, funneling data to advertisers under the radar.
Suno also uploads 3.82 MB of data during our capture — orders of magnitude more than
the others.
| POST Destination | Count |
|---|---|
studio-api.prod.suno.com |
637 |
analytics.tiktok.com |
203 |
m-stratovibe.prod.suno.com |
95 |
bat.bing.com / k.clarity.ms |
63 each |
b.applovin.com |
53 |
Suno's surveillance apparatus is unmatched in the creative AI sector. From Microsoft Clarity GPU loops to hCaptcha proof-of-work mining, this platform is a privacy minefield. If you're using Suno, you're not just creating music — you're funding a data broker.
🔴 Udio: Closer to Suno Than You'd Like
Udio lands in the high-threat category, with 357 total requests over a 19.2-minute capture and a troubling 52.7% POST ratio (188 POSTs). It connects to 3 third-party domains and deploys 6 trackers, including Sentry (15 requests) and Tapad Identity Graph (1 request) — the same cross-device tracker Suno leans on heavily.
Udio uses a Mixpanel proxy at mp.udio.com/track/ with explicit IP capture
(?ip=1) in 22 POSTs. This mirrors Suno's aggressive profiling tactics. The
verbose=1 flag suggests they're actively debugging their tracking pipeline — not hiding
it, but perfecting it.
We flagged 32 PII leakage entries, exposing email, phone, and
user_id via endpoints like api.udio.com/auth/v1/token. Udio's behavior isn't
as egregious as Suno's, but it's cut from the same cloth.
🟡 ElevenLabs: Minimal Footprint, Hidden Tricks
ElevenLabs presents a lighter profile compared to Suno, with only 87 total requests over a 1.2-minute
capture and a 43.7% POST ratio (38 POSTs). It connects to just 1 third-party domain
(firestore.googleapis.com) and deploys 4 trackers. However, don't let the numbers fool you
— ElevenLabs isn't clean.
ElevenLabs employs a disguised PostHog proxy under the path
/dachshund/, with 13 POSTs bypassing adblockers by design. The endpoint
elevenlabs.io/dachshund/750915/i/v0/e/ uses gzip-compressed payloads of up to 73 KB —
this is deliberate adblock evasion infrastructure, not incidental analytics.
We detected 26 PII leakage entries, exposing email, first_name,
geo_location, and user_id via endpoints like
api.us.elevenlabs.io/v1/auth-account. The obfuscation tactics suggest intent to hide
tracking from casual observers.
🟢 Midjourney: The Cleanest of the Bunch
Midjourney stands out as the least invasive platform in this audit. With just 48 total requests over a 0.5-minute capture and a low 22.9% POST ratio (11 POSTs), it's a stark contrast to Suno's bloat. Midjourney connects to 3 third-party domains and uses 5 trackers, primarily Amplitude (9 requests). Data exfiltration is minimal, with only 0.03 MB uploaded.
We identified 8 PII leakage entries, exposing email, phone, and
user_id via the explore and firebase-login API endpoints. While not ideal, this is a far
cry from Suno's 600 entries. Midjourney's approach appears to prioritize functionality over
surveillance.
Conclusion: Suno Sets a Dangerous Precedent
Our forensic audit paints a damning picture of the creative AI landscape. Suno stands alone as a surveillance titan, with a 62.2% POST ratio, 24 trackers, 600 PII-leaking responses, and 203 proxied analytics endpoints — numbers that dwarf its peers. Its reliance on Tapad Identity Graph (484 requests) and TikTok pixel POSTs (203) reveals an infrastructure built for data brokering, not just music generation. This is unprecedented in the sector and a clear warning to users.
Udio, with a 52.7% POST ratio and Mixpanel proxies capturing IP data, is the closest to Suno's model. ElevenLabs, while less invasive, employs adblock-evasion tactics via disguised PostHog proxies. Midjourney emerges as the cleanest, with a low 22.9% POST ratio and standard Amplitude analytics, but even it isn't immune to PII leakage.
If you value privacy, tread carefully. Suno's apparatus is a glaring red flag for the industry, normalizing aggressive surveillance under the guise of "free" tools. At VNR, we'll continue to expose these practices and hold platforms accountable.
Methodology: How We Caught Them
At Voss Neural Research, transparency in our methods is non-negotiable. This audit was conducted using HTTP Archive (HAR) captures — a standardized format for recording web traffic. We deployed controlled browser sessions for each platform over consistent usage scenarios (account login, content generation, session idle). Captures spanned varying durations to reflect real-world interaction patterns.
Raw HAR data was parsed through our Antigravity Forensic Engine, a custom-built tool for dissecting web traffic. We filtered cross-session contamination by URL hostname and Referer headers to ensure accuracy. Metrics like POST ratios, third-party domains, and PII leakage were extracted programmatically, with manual validation for critical findings.
Our analysis adheres to the VOSS Protocol, VNR's internal standard for forensic auditing:
- Repeatability: Standardized capture and parsing methods to ensure consistent results.
- Granularity: Deep inspection of request methods, payloads, and response headers for hidden tracking.
- Attribution: Mapping data flows to specific domains, trackers, and endpoints for accountability.
If platforms dispute our findings, we're ready to publish the raw HAR logs (anonymized for user safety) to back every claim. This isn't speculation — it's evidence, captured and analyzed with surgical precision.