Privacy by Design

What we cannot see cannot be shared.

01

No IP Logging. Zero Traces.

We do not collect, store, or share your data. Most services log your IP for rate limiting; we don't. Our infrastructure is designed to be blind to your network identity. What we do not see, we cannot log or hand over.

02

Stateless Proof-of-Work (PoW)

To prevent abuse without tracking you, we use anonymous CPU-based challenges (Hashcash). Your browser solves a small puzzle to prove a human is behind the request, allowing us to maintain a stable service without ever needing to know who or where you are.

03

Zero-Knowledge Fragments

Encryption happens purely in your browser. The decryption key remains in the URL fragment (the part after the #), which is never sent to the network. The server only sees an encrypted blob it cannot read.

04

RAM-Only & No-Store Policy

Decrypted content is kept in volatile RAM and is never saved to cookies, local storage, or browser caches. Strict 'No-Store' headers ensure that no proxy or browser keeps a local copy of your session. Once consumed or expired, data is physically wiped from our disks.