Privacy Policy
Last updated: December 28, 2025
Information We Collect
We believe in data minimalism. We only collect the absolute minimum amount of information necessary to provide our service to you.
- ▶Email Address We store your email address for the sole purpose of authenticating your access to the service (e.g., verifying Magic Link logins).
- ▶Username We assign a randomly generated display name (username) to your account. You may change it, subject to character and uniqueness restrictions.
- ▶Passkeys (WebAuthn) If you utilize Passkeys for emailless login, we use Discoverable Credentials (Resident Keys). Your private key remains on your device, we only store the public key and standard attestation data needed to verify your identity.
- ▶Authentication Tokens To fulfill your requests (such as accessing creator content), we need to process authentication tokens (e.g., JWTs or session IDs) for the specific platforms you connect.
- ▶Hashed IP Addresses (Rate Limiting) To protect our service from abuse, we typically limit the rate of requests IP addresses can make. We process IP addresses for this purpose using privacy-preserving methods: IPs are securely hashed (SHA256) and truncated before being stored in temporary memory. These hashed values typically expire within minutes and are never written to disk.
- ▶Audit Logs For security and compliance, we maintain records of significant administrative actions taken on your account (e.g., role or subscription changes). These logs contain metadata only and are used exclusively for abuse prevention and support investigations.
- ▶Request IDs Each request is assigned a unique identifier for the sole purpose of debugging. These IDs are not linked to personal data and are not retained beyond transient logs.
Information We Do Not Collect
We are strictly privacy-first. Unlike many web services, we have explicitly architected our system to avoid collecting common surveillance data.
How We Use Your Data
The limited data we hold is used solely for:
Infrastructure & Third Parties
Our service runs on cloud infrastructure provided by upstream cloud providers. While these providers may strictly log IP addresses at the network edge for infrastructure security (e.g., DDoS protection), we do not:
Data Security
We implement industry-leading security measures, including strong encryption in transit (TLS) and the use of cryptographic authentication methods (Passkeys/WebAuthn) that eliminate the risks associated with password databases. However, no method of transmission over the Internet is 100% secure.