Privacy

Privacy Policy

Effective Date: 02-01-2025
Last Updated: 04-06-2025

Ransomwared (“we”, “our”, or “us”) is fully committed to protecting your privacy and maintaining a transparent relationship with our users. Our service is designed with privacy in mind: we do not collect, store, analyze, share, or sell any personal data. We also do not use cookies, trackers, or any analytics tools that monitor your behavior.

This Privacy Policy outlines our data handling practices — or more accurately, our commitment to not handle your data — and our principles of secure, anonymous, and respectful software use.


1. No Personal Data Collection

When you access or use the Ransomwared website, dashboard, or app, we do not collect any of the following:

  • Your name

  • Email address

  • IP address

  • Device type or identifier

  • Browser or operating system details

  • Geolocation or country

  • Search history or input logs

  • Any personally identifiable information (PII)

We deliberately do not offer account creation or registration. You can use our services without signing in or creating a profile.


2. No Cookies or Tracking

We do not use:

  • Session cookies

  • Persistent cookies

  • Third-party tracking pixels

  • Behavioral profiling scripts

  • Advertising identifiers

  • Analytics or fingerprinting technology

There are no embedded analytics platforms such as Google Analytics, Meta Pixel, Hotjar, or similar. Your visit to our site is not tracked, logged, or fingerprinted in any way.


3. No Server-Side Logging of User Activity

The only server-side operation we perform is real-time AI-based analysis of content (such as URLs you submit). These inputs are:

  • Processed instantly

  • Not linked to any user or IP address

  • Not stored or cached

  • Not shared with any third party

Once the analysis result is delivered, all input and metadata are discarded immediately from memory. We maintain no audit trail of user activity.


4. Token Use and Local Context

Our service uses a token-based system for performing analyses. All token usage is:

  • Initiated by the user

  • Processed securely

  • Recorded only for functional purposes such as balance tracking and usage limits

We do not associate token use with any individual, account, or identity. Tokens are managed locally or within your own tenant environment, and we do not maintain user profiles or store associated data.


5. No Third-Party Sharing

Since we do not collect any personal or usage data, there is nothing to share. However, to ensure clarity:

  • We do not sell, rent, or disclose your data to any third parties.

  • We do not use advertising networks.

  • We do not integrate social media plugins that may leak identifiable data.

In the rare event that data is transferred (e.g., for debugging or error reporting), it is anonymized and never linked to any user.


6. Infrastructure and Hosting

We use secure and privacy-respecting infrastructure providers that support our zero-data model. Our server environments are configured to:

  • Disable logging of requests and headers

  • Avoid storing logs that contain any PII

  • Prevent persistent storage of temporary input data

All transmissions between your browser or app and our servers are encrypted with TLS/SSL.


7. Legal Compliance

Although we do not collect personal data, we still adhere to relevant privacy laws and principles, including:

  • General Data Protection Regulation (GDPR) (EU)

  • California Consumer Privacy Act (CCPA)

  • ePrivacy Directive

  • Other regional and international privacy standards

Because we do not process any personal data, your GDPR rights (e.g. right to access, erasure, portability, etc.) are respected by default — as there is no data to access or erase.


8. Children’s Privacy

Our website and application are not directed at children under the age of 16. However, since we collect no data, we do not knowingly store or process any data from minors.


9. Security Principles

While we do not store data, we take security very seriously:

  • All connections are encrypted

  • Input analysis is ephemeral and memory-cleared

  • Token operations are securely isolated

  • Infrastructure is hardened against logging and telemetry

  • Code is regularly reviewed for privacy violations and hardcoded data leaks


10. Updates to This Policy

We may update this Privacy Policy to reflect changes in technology, legal requirements, or our privacy practices. When we do, we will update the “Effective Date” at the top of this document.

All changes are made in alignment with our core commitment to user privacy and data minimalism.


11. Contact Us

If you have any questions, concerns, or requests related to privacy, please contact us:

📧 Email: privacy@ransomwared.eu
🌍 Web: www.ransomwared.eu