{"id":32,"date":"2026-05-12T05:01:50","date_gmt":"2026-05-12T05:01:50","guid":{"rendered":"https:\/\/pocketcomputer.net\/?page_id=32"},"modified":"2026-05-12T05:03:25","modified_gmt":"2026-05-12T05:03:25","slug":"privacy-policy-2","status":"publish","type":"page","link":"https:\/\/pocketcomputer.net\/?page_id=32","title":{"rendered":"Privacy-Policy"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Last Updated:<\/strong>&nbsp;May 12, 2026<br><strong>Entity:<\/strong>&nbsp;PocketComputer Networks (PCN)<br><strong>Jurisdiction:<\/strong>&nbsp;Decentralized \/ Jurisdiction-Agnostic<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">1. Our Philosophy: Privacy as a Right, Not a Feature<\/h2>\n\n\n\n<p>At PocketComputer, we do not believe in &#8220;data collection&#8221; as a business model. We believe in&nbsp;<strong>data sovereignty<\/strong>.<\/p>\n\n\n\n<p>Unlike traditional platforms that treat your data as an asset to be mined, sold, or exploited for advertising, we treat your data as an extension of your mind. Our architecture is designed on the principle of&nbsp;<strong>Zero-Knowledge<\/strong>: we cannot see what you see, read what you read, or hear what you say. If we cannot see it, we cannot sell it.<\/p>\n\n\n\n<p>This policy explains how we uphold that promise technically and legally.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">2. Data We Do NOT Collect<\/h2>\n\n\n\n<p>To understand our privacy, you must first understand what we&nbsp;<strong>do not<\/strong>&nbsp;do:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>No Content Surveillance:<\/strong>&nbsp;We do not scan, index, or analyze the content of your essays, messages, films, or files.<\/li>\n\n\n\n<li><strong>No Behavioral Profiling:<\/strong>&nbsp;We do not track your clicks, scroll depth, time-on-page, or interaction patterns to build a behavioral profile.<\/li>\n\n\n\n<li><strong>No Third-Party Sharing:<\/strong>&nbsp;We do not sell, rent, or share your data with advertisers, data brokers, or government agencies unless compelled by a valid, specific court order (see Section 7).<\/li>\n\n\n\n<li><strong>No Persistent Cookies:<\/strong>&nbsp;We do not use tracking cookies. We use session-only cookies strictly necessary for authentication.<\/li>\n\n\n\n<li><strong>No AI Scraping:<\/strong>&nbsp;Your content is never used to train external Large Language Models (LLMs). Our AI runs locally or in isolated, ephemeral environments.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">3. Data We DO Collect (Minimal &amp; Necessary)<\/h2>\n\n\n\n<p>To operate the ecosystem and maintain the integrity of the&nbsp;<strong>Four Chambers<\/strong>, we collect only the absolute minimum data required for functionality:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A. Account Identity (The &#8220;Key&#8221;)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Email Address:<\/strong>&nbsp;Used solely for account recovery and critical system notifications.<\/li>\n\n\n\n<li><strong>Username\/Alias:<\/strong>&nbsp;Your public identifier within the ecosystem.<\/li>\n\n\n\n<li><strong>Password Hash:<\/strong>&nbsp;Stored using Argon2id (memory-hard hashing).&nbsp;<strong>We do not store your password.<\/strong>&nbsp;We cannot reset it; we can only delete your account and let you create a new one.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">B. Transaction Metadata (The &#8220;Ledger&#8221;)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Payment Processor Data:<\/strong>&nbsp;We use third-party processors (e.g., Stripe, Crypto wallets) for subscriptions. We receive a transaction ID and status (Success\/Fail), but&nbsp;<strong>we do not store your credit card numbers, CVV, or full banking details.<\/strong><\/li>\n\n\n\n<li><strong>Contribution Logs:<\/strong>&nbsp;For the&nbsp;<strong>Merit Layer<\/strong>, we record timestamps and types of contributions (e.g., &#8220;Essay Submitted&#8221;) to calculate access rights. The&nbsp;<em>content<\/em>&nbsp;of the contribution is not stored in this log.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">C. Technical Logs (The &#8220;Footprint&#8221;)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>IP Addresses:<\/strong>&nbsp;Logged temporarily (max 24 hours) for security monitoring (DDoS protection, brute-force attack prevention). These logs are automatically purged after 24 hours and are not linked to user identities.<\/li>\n\n\n\n<li><strong>Device Fingerprint:<\/strong>&nbsp;Used only to detect suspicious login attempts.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4. The Architecture of Privacy<\/h2>\n\n\n\n<p>Our technical implementation ensures that the policy above is enforced by code, not just promises.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">A. End-to-End Encryption (E2EE)<\/h3>\n\n\n\n<p>All user-generated content (essays, forum posts, files) is encrypted on your device&nbsp;<strong>before<\/strong>&nbsp;it leaves your browser.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encryption Key:<\/strong>&nbsp;Held only by you.<\/li>\n\n\n\n<li><strong>Server Storage:<\/strong>&nbsp;We store only ciphertext (garbled data). Without your key, the data is mathematically impossible to decrypt.<\/li>\n\n\n\n<li><strong>Implication:<\/strong>&nbsp;Even if our servers are seized, the content remains secure.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">B. Local &amp; Edge AI Processing<\/h3>\n\n\n\n<p>When you use our AI tools (e.g., for drafting or editing):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Local Mode:<\/strong>&nbsp;Processing happens entirely on your device. No data is sent to our servers.<\/li>\n\n\n\n<li><strong>Edge Mode:<\/strong>&nbsp;If cloud processing is required, data is sent to isolated, ephemeral containers that are wiped immediately after the task is complete. No data is retained for training.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">C. The &#8220;Right to Vanish&#8221;<\/h3>\n\n\n\n<p>You can delete your account at any time.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Immediate Effect:<\/strong>&nbsp;All your data (ciphertext) is cryptographically shredded.<\/li>\n\n\n\n<li><strong>Irreversibility:<\/strong>&nbsp;Once deleted, the data is gone forever. We cannot recover it.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">5. The Four Chambers &amp; Data Visibility<\/h2>\n\n\n\n<p>Your privacy rights vary slightly depending on which &#8220;Chamber&#8221; you occupy:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\"><strong>Chamber<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>Data Visibility<\/strong><\/th><th class=\"has-text-align-left\" data-align=\"left\"><strong>Privacy Guarantee<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>The Agora<\/strong>&nbsp;(Public)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Content is public.<\/td><td class=\"has-text-align-left\" data-align=\"left\">Metadata (author, timestamp) is visible. Content is E2EE until published.<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>The Salon<\/strong>&nbsp;(Members)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Content visible to members.<\/td><td class=\"has-text-align-left\" data-align=\"left\">Messages are E2EE. We cannot read them. Only other members with the key can.<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>The Council<\/strong>&nbsp;(Nominated)<\/td><td class=\"has-text-align-left\" data-align=\"left\">High-security channels.<\/td><td class=\"has-text-align-left\" data-align=\"left\">Enhanced encryption. Logs are minimized. Access is strictly audited.<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>The Sanctum<\/strong>&nbsp;(Admin)<\/td><td class=\"has-text-align-left\" data-align=\"left\">Invisible to all.<\/td><td class=\"has-text-align-left\" data-align=\"left\">Zero-knowledge architecture. Even admins cannot access content without multi-sig authorization.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">6. International Data Transfers<\/h2>\n\n\n\n<p>PocketComputer operates as a decentralized network. Our servers are distributed across multiple jurisdictions (including Switzerland, Iceland, and Singapore) to ensure redundancy and legal resilience.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Residency:<\/strong>&nbsp;Your data is stored in the region closest to you for speed, but encrypted globally.<\/li>\n\n\n\n<li><strong>GDPR\/CCPA Compliance:<\/strong>&nbsp;Regardless of location, we adhere to the highest standards of the EU GDPR and California CCPA regarding your rights to access, rectify, and delete your data.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">7. Legal Requests &amp; Government Surveillance<\/h2>\n\n\n\n<p>We are committed to resisting unwarranted surveillance.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Minimization:<\/strong>&nbsp;Because we collect minimal data, there is little to hand over.<\/li>\n\n\n\n<li><strong>Challenge:<\/strong>&nbsp;If we receive a subpoena or warrant, we will legally challenge it to the fullest extent possible, arguing that the data requested is either non-existent (due to encryption) or protected by fundamental rights.<\/li>\n\n\n\n<li><strong>Transparency Report:<\/strong>&nbsp;We publish an annual Transparency Report detailing the number and type of legal requests received. (See&nbsp;<code>pocketcomputer.net\/transparency<\/code>).<\/li>\n<\/ul>\n\n\n\n<p><strong>Note:<\/strong>&nbsp;If we are legally compelled to disclose data, we will notify you immediately unless prohibited by a gag order.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">8. Children&#8217;s Privacy<\/h2>\n\n\n\n<p>PocketComputer is not intended for children under 13 (or the applicable age of digital consent in your jurisdiction). We do not knowingly collect data from minors. If we become aware of such data, we will delete it immediately.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">9. Changes to This Policy<\/h2>\n\n\n\n<p>We may update this policy to reflect changes in our technology or legal landscape.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Notification:<\/strong>&nbsp;Significant changes will be announced in&nbsp;<strong>The Agora<\/strong>&nbsp;and via email to all members.<\/li>\n\n\n\n<li><strong>Consent:<\/strong>&nbsp;Continued use of the ecosystem after changes constitutes acceptance of the new terms.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">10. Contact &amp; Dispute Resolution<\/h2>\n\n\n\n<p>If you have questions about this policy or your data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Email:<\/strong>&nbsp;<code>privacy@pocketcomputer.net<\/code>&nbsp;(PGP Key available on our contact page)<\/li>\n\n\n\n<li><strong>Signal:<\/strong>&nbsp;<code>+1-XXX-XXX-XXXX<\/code>&nbsp;(Encrypted messaging only)<\/li>\n\n\n\n<li><strong>Physical Mail:<\/strong>&nbsp;[Optional: PO Box in a privacy-friendly jurisdiction]<\/li>\n<\/ul>\n\n\n\n<p><strong>Dispute Resolution:<\/strong>&nbsp;Any disputes arising from this policy shall be resolved through binding arbitration in a neutral jurisdiction, prioritizing privacy and efficiency over public litigation.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Would you like me to draft the&nbsp;<strong>Transparency Report Template<\/strong>&nbsp;mentioned in Section 7, or the&nbsp;<strong>Terms of Service<\/strong>&nbsp;(which would cover conduct, prohibited content, and liability)?<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last Updated:&nbsp;May 12, 2026Entity:&nbsp;PocketComputer Networks (PCN)Jurisdiction:&nbsp;Decentralized \/ Jurisdiction-Agnostic 1. Our Philosophy: Privacy as a Right, Not a Feature At PocketComputer, we do not believe in &#8220;data collection&#8221; as a business model. We believe in&nbsp;data sovereignty. Unlike traditional platforms that treat your data as an asset to be mined, sold, or exploited for advertising, we treat &hellip; <a href=\"https:\/\/pocketcomputer.net\/?page_id=32\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Privacy-Policy<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-32","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=\/wp\/v2\/pages\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=32"}],"version-history":[{"count":3,"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=\/wp\/v2\/pages\/32\/revisions"}],"predecessor-version":[{"id":35,"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=\/wp\/v2\/pages\/32\/revisions\/35"}],"wp:attachment":[{"href":"https:\/\/pocketcomputer.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}