USER PRIVACY POLICY
None of the personal information provided by the user is stored directly or indirectly on the server.
The platform will NOT:
share/market/distribute/sell/
buy/trade/
loan/release/show/forward
the hash or the raw form of the users' personal information
that the user has provided here
to/from/with/for/on/in/
or as any other:
user/third-party/
website/business/
corporation in any form/method for any reason.
Security Practices and Mechanics
The cypher used to encrypt does not encrypt the users information directly nor does it give the location to any encrypted or any plain text representing the users information.
The structure is made of Data Segments that are populated with the Data Fragments of Data Objects.
The Users information that was submitted as well as the users Device information and the users User Agent each make up their own Data Object.
Each Data Object gets split into groups of Data Fragments that will populate their own Data Segments.The original Data Objects now get Destroyed.
The length of each Data Segment as well as an assortment of individual Fragments are selected from the Data Fragments using an Obfuscator Algorithm, then the contents of each Data Segment and the remaining Data Fragments get Destroyed.
The Obfuscator Algorithm is selected from a list of Obfuscator Algorithm aliases using a Selector Algorithm.
From within the Selector Algorithm, each step and that steps calculated variable as well as the alias of the chosen Obfuscator Algorithm is added to the list of Fragments.
Each of the Fragments are encrypted using an Encryption Algorithm, once Encrypted the hashes get merged together.
The Encryption Algorithm used is selected from a list of Encryption Algorithms that each have an alias, the selection is made using a Selector Algorithm.
From within the Selector Algorithm, each step and that steps calculated variable as well as the alias of the chosen Encryption Algorithm is added to the list of encrypted Fragments.
A copy of the Fragments are each converted into a different data type then encrypted using a different Encryption Algorithm.The hashes get merged together and added to the list with the data type.
The list is reordered and reformatted to become the file name that the user needs to upload in order to "log in"