Audacity users are seriously angry right now - here’s why

Audacity
(Image credit: Audacity)

An update to the Audacity privacy policy has raised concerns the audio editor may be used to harvest a wealth of user data under its new ownership.

Audacity was purchased earlier this year by a company called Muse Group, which owns various music and audio software, such as Ultimate Guitar, MuseScore and Tonebridge.

When the acquisition was announced, Muse Group promised the software would remain free and open source. However, sections of the community believe the new privacy policy runs counter to philosophies and ambitions of the open source movement; some have gone as far as to call Audacity “spyware”.

Under the new privacy policy, Audacity will collect information such as OS version, CPU and error codes, but also the location of the user. According to the policy, this information is required for analytics purposes and to improve the application, although it’s unclear where location data slots into this picture.

The policy goes on to state that Audacity will collect “data necessary for law enforcement, litigation and authorities’ requests”, but does not expand on what type of information this clause might cover, leading to speculation it could be used to justify an unacceptable breach of user privacy.

Audacity outcry

Ever since the Audacity acquisition, relations between Muse Group and the open source community have been strained.

The company ruffled feathers with a new Contributor License Agreement (CLA) for Audacity, which contributors were required to sign if they wanted to continue to work on the project. This new agreement also stipulated that Muse Group must be given unrestricted rights to all contributions.

A significant portion of the community felt the new CLA compromised the values of the open source ecosystem, built around the concepts of transparency and collaboration, by allowing Muse Group to use code submitted by contributors in other non-open source projects.

For others, the privacy policy update was the final straw. Contributors have taken to both GitHub and Reddit to call for a fork of the software, which would see developers break away to develop a new audio editor, using Audacity code as the backbone.

TechRadar Pro asked Muse Group for specific details about the data collection activities covered by the privacy policy and for a perspective on the community outcry, but the company has not yet responded.

Via FOSS Post

Joel Khalili
News and Features Editor

Joel Khalili is the News and Features Editor at TechRadar Pro, covering cybersecurity, data privacy, cloud, AI, blockchain, internet infrastructure, 5G, data storage and computing. He's responsible for curating our news content, as well as commissioning and producing features on the technologies that are transforming the way the world does business.

Read more
A laptop with digitally inserted hack warnings around it
Is DeepSeek AI safe to use? Think twice before you download DeepSeek for the time being
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
The US privacy nightmare? What's changed after 30 days of President Trump's new administration
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Which apps were most hungry for your data in 2024?
A person holding out their hand with a digital AI symbol.
DeepSeek kicks off the next wave of the AI rush
This photograph shows wordmark of Siri, a digital assistant developed by Apple Inc., displayed on a smartphone
Did Siri break the law? Apple's latest privacy complaint in France doesn't bode well
Actalis SSL encryption
Apple is right not to bow down to the UK government's encryption backdoor request - but users should still be angry
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras