We protect your data through decentralized infrastructure, cryptographic security, and transparent policies. This document outlines how we handle information in compliance with global standards.
We collect the minimum necessary to support decentralized operations. This includes:
Lattice-based cryptographic algorithms for future-proof security
Cryptographic verification without exposing sensitive data
Data distributed across 3+ peer networks for redundancy
User data remains encrypted and available on-chain for the lifetime of the application. We automatically archive inactive accounts to cold storage after 180 consecutive days of inactivity.
We are committed to clear, understandable policies. For direct questions about your data, or to exercise your privacy rights:
� Contact Us