Privacy Policy
Effective Date: 02-01-2025
Last Updated: 04-06-2025
Ransomwared (“we”, “our”, or “us”) is fully committed to protecting your privacy and maintaining a transparent relationship with our users. Our service is designed with privacy in mind: we do not collect, store, analyze, share, or sell any personal data. We also do not use cookies, trackers, or any analytics tools that monitor your behavior.
This Privacy Policy outlines our data handling practices — or more accurately, our commitment to not handle your data — and our principles of secure, anonymous, and respectful software use.
1. No Personal Data Collection
When you access or use the Ransomwared website, dashboard, or app, we do not collect any of the following:
-
Your name
-
Email address
-
IP address
-
Device type or identifier
-
Browser or operating system details
-
Geolocation or country
-
Search history or input logs
-
Any personally identifiable information (PII)
We deliberately do not offer account creation or registration. You can use our services without signing in or creating a profile.
2. No Cookies or Tracking
We do not use:
-
Session cookies
-
Persistent cookies
-
Third-party tracking pixels
-
Behavioral profiling scripts
-
Advertising identifiers
-
Analytics or fingerprinting technology
There are no embedded analytics platforms such as Google Analytics, Meta Pixel, Hotjar, or similar. Your visit to our site is not tracked, logged, or fingerprinted in any way.
3. No Server-Side Logging of User Activity
The only server-side operation we perform is real-time AI-based analysis of content (such as URLs you submit). These inputs are:
-
Processed instantly
-
Not linked to any user or IP address
-
Not stored or cached
-
Not shared with any third party
Once the analysis result is delivered, all input and metadata are discarded immediately from memory. We maintain no audit trail of user activity.
4. Token Use and Local Context
Our service uses a token-based system for performing analyses. All token usage is:
-
Initiated by the user
-
Processed securely
-
Recorded only for functional purposes such as balance tracking and usage limits
We do not associate token use with any individual, account, or identity. Tokens are managed locally or within your own tenant environment, and we do not maintain user profiles or store associated data.
5. No Third-Party Sharing
Since we do not collect any personal or usage data, there is nothing to share. However, to ensure clarity:
-
We do not sell, rent, or disclose your data to any third parties.
-
We do not use advertising networks.
-
We do not integrate social media plugins that may leak identifiable data.
In the rare event that data is transferred (e.g., for debugging or error reporting), it is anonymized and never linked to any user.
6. Infrastructure and Hosting
We use secure and privacy-respecting infrastructure providers that support our zero-data model. Our server environments are configured to:
-
Disable logging of requests and headers
-
Avoid storing logs that contain any PII
-
Prevent persistent storage of temporary input data
All transmissions between your browser or app and our servers are encrypted with TLS/SSL.
7. Legal Compliance
Although we do not collect personal data, we still adhere to relevant privacy laws and principles, including:
-
General Data Protection Regulation (GDPR) (EU)
-
California Consumer Privacy Act (CCPA)
-
ePrivacy Directive
-
Other regional and international privacy standards
Because we do not process any personal data, your GDPR rights (e.g. right to access, erasure, portability, etc.) are respected by default — as there is no data to access or erase.
8. Children’s Privacy
Our website and application are not directed at children under the age of 16. However, since we collect no data, we do not knowingly store or process any data from minors.
9. Security Principles
While we do not store data, we take security very seriously:
-
All connections are encrypted
-
Input analysis is ephemeral and memory-cleared
-
Token operations are securely isolated
-
Infrastructure is hardened against logging and telemetry
-
Code is regularly reviewed for privacy violations and hardcoded data leaks
10. Updates to This Policy
We may update this Privacy Policy to reflect changes in technology, legal requirements, or our privacy practices. When we do, we will update the “Effective Date” at the top of this document.
All changes are made in alignment with our core commitment to user privacy and data minimalism.
11. Contact Us
If you have any questions, concerns, or requests related to privacy, please contact us:
📧 Email: privacy@ransomwared.eu
🌍 Web: www.ransomwared.eu