Last Updated: May 12, 2026
Entity: PocketComputer Networks (PCN)
Jurisdiction: Decentralized / Jurisdiction-Agnostic
1. Our Philosophy: Privacy as a Right, Not a Feature
At PocketComputer, we do not believe in “data collection” as a business model. We believe in data sovereignty.
Unlike traditional platforms that treat your data as an asset to be mined, sold, or exploited for advertising, we treat your data as an extension of your mind. Our architecture is designed on the principle of Zero-Knowledge: we cannot see what you see, read what you read, or hear what you say. If we cannot see it, we cannot sell it.
This policy explains how we uphold that promise technically and legally.
2. Data We Do NOT Collect
To understand our privacy, you must first understand what we do not do:
- No Content Surveillance: We do not scan, index, or analyze the content of your essays, messages, films, or files.
- No Behavioral Profiling: We do not track your clicks, scroll depth, time-on-page, or interaction patterns to build a behavioral profile.
- No Third-Party Sharing: We do not sell, rent, or share your data with advertisers, data brokers, or government agencies unless compelled by a valid, specific court order (see Section 7).
- No Persistent Cookies: We do not use tracking cookies. We use session-only cookies strictly necessary for authentication.
- No AI Scraping: Your content is never used to train external Large Language Models (LLMs). Our AI runs locally or in isolated, ephemeral environments.
3. Data We DO Collect (Minimal & Necessary)
To operate the ecosystem and maintain the integrity of the Four Chambers, we collect only the absolute minimum data required for functionality:
A. Account Identity (The “Key”)
- Email Address: Used solely for account recovery and critical system notifications.
- Username/Alias: Your public identifier within the ecosystem.
- Password Hash: Stored using Argon2id (memory-hard hashing). We do not store your password. We cannot reset it; we can only delete your account and let you create a new one.
B. Transaction Metadata (The “Ledger”)
- Payment Processor Data: We use third-party processors (e.g., Stripe, Crypto wallets) for subscriptions. We receive a transaction ID and status (Success/Fail), but we do not store your credit card numbers, CVV, or full banking details.
- Contribution Logs: For the Merit Layer, we record timestamps and types of contributions (e.g., “Essay Submitted”) to calculate access rights. The content of the contribution is not stored in this log.
C. Technical Logs (The “Footprint”)
- IP Addresses: Logged temporarily (max 24 hours) for security monitoring (DDoS protection, brute-force attack prevention). These logs are automatically purged after 24 hours and are not linked to user identities.
- Device Fingerprint: Used only to detect suspicious login attempts.
4. The Architecture of Privacy
Our technical implementation ensures that the policy above is enforced by code, not just promises.
A. End-to-End Encryption (E2EE)
All user-generated content (essays, forum posts, files) is encrypted on your device before it leaves your browser.
- Encryption Key: Held only by you.
- Server Storage: We store only ciphertext (garbled data). Without your key, the data is mathematically impossible to decrypt.
- Implication: Even if our servers are seized, the content remains secure.
B. Local & Edge AI Processing
When you use our AI tools (e.g., for drafting or editing):
- Local Mode: Processing happens entirely on your device. No data is sent to our servers.
- Edge Mode: If cloud processing is required, data is sent to isolated, ephemeral containers that are wiped immediately after the task is complete. No data is retained for training.
C. The “Right to Vanish”
You can delete your account at any time.
- Immediate Effect: All your data (ciphertext) is cryptographically shredded.
- Irreversibility: Once deleted, the data is gone forever. We cannot recover it.
5. The Four Chambers & Data Visibility
Your privacy rights vary slightly depending on which “Chamber” you occupy:
| Chamber | Data Visibility | Privacy Guarantee |
|---|---|---|
| The Agora (Public) | Content is public. | Metadata (author, timestamp) is visible. Content is E2EE until published. |
| The Salon (Members) | Content visible to members. | Messages are E2EE. We cannot read them. Only other members with the key can. |
| The Council (Nominated) | High-security channels. | Enhanced encryption. Logs are minimized. Access is strictly audited. |
| The Sanctum (Admin) | Invisible to all. | Zero-knowledge architecture. Even admins cannot access content without multi-sig authorization. |
6. International Data Transfers
PocketComputer operates as a decentralized network. Our servers are distributed across multiple jurisdictions (including Switzerland, Iceland, and Singapore) to ensure redundancy and legal resilience.
- Data Residency: Your data is stored in the region closest to you for speed, but encrypted globally.
- GDPR/CCPA Compliance: Regardless of location, we adhere to the highest standards of the EU GDPR and California CCPA regarding your rights to access, rectify, and delete your data.
7. Legal Requests & Government Surveillance
We are committed to resisting unwarranted surveillance.
- Minimization: Because we collect minimal data, there is little to hand over.
- Challenge: If we receive a subpoena or warrant, we will legally challenge it to the fullest extent possible, arguing that the data requested is either non-existent (due to encryption) or protected by fundamental rights.
- Transparency Report: We publish an annual Transparency Report detailing the number and type of legal requests received. (See
pocketcomputer.net/transparency).
Note: If we are legally compelled to disclose data, we will notify you immediately unless prohibited by a gag order.
8. Children’s Privacy
PocketComputer is not intended for children under 13 (or the applicable age of digital consent in your jurisdiction). We do not knowingly collect data from minors. If we become aware of such data, we will delete it immediately.
9. Changes to This Policy
We may update this policy to reflect changes in our technology or legal landscape.
- Notification: Significant changes will be announced in The Agora and via email to all members.
- Consent: Continued use of the ecosystem after changes constitutes acceptance of the new terms.
10. Contact & Dispute Resolution
If you have questions about this policy or your data:
- Email:
privacy@pocketcomputer.net(PGP Key available on our contact page) - Signal:
+1-XXX-XXX-XXXX(Encrypted messaging only) - Physical Mail: [Optional: PO Box in a privacy-friendly jurisdiction]
Dispute Resolution: Any disputes arising from this policy shall be resolved through binding arbitration in a neutral jurisdiction, prioritizing privacy and efficiency over public litigation.
Would you like me to draft the Transparency Report Template mentioned in Section 7, or the Terms of Service (which would cover conduct, prohibited content, and liability)?