Stork SMS is built with privacy-by-design principles, ensuring your personal information remains protected while enabling secure Web3 communication.
Core Privacy Principles
Data Minimization
- Wallet Addresses Only: No personal information required for registration
- No Phone Numbers: Authentication purely through cryptographic signatures
- Minimal Metadata: Only essential operational data collected
- Anonymous by Default: Pseudonymous identity through wallet addresses
User Control
- Data Ownership: Users control their message data and access rights
- NFT-Based Access: Transferable chat permissions via blockchain ownership
- Message Deletion: Users can delete their messages from the platform
- Export Rights: Full data portability and export capabilities
Data Collection Practices
What We Collect
Essential Data (Required for Service)
Message Data (Encrypted)
Temporary Media Storage
- Image Files: Temporarily stored for optimization and delivery
- Voice Messages: Stored for streaming and playback
- Retention Policy: Automatic deletion after 30 days of inactivity
- Access Control: Only chat participants can access media
What We DONβT Collect
Personal Information
β Real Names: No name or identity verification required β Email Addresses: No email collection or verification β Phone Numbers: No phone-based authentication β Government IDs: No identity document requirements β Physical Addresses: No location or address collectionTracking Data
β Browsing History: No tracking outside the application β Device Fingerprinting: No unique device identification β Location Data: No GPS or location tracking β Cross-Site Tracking: No third-party tracking scripts β Behavioral Profiling: No detailed usage pattern analysisSensitive Metadata
β Private Keys: Never transmitted or stored server-side β Seed Phrases: No wallet recovery phrase collection β Transaction History: No comprehensive transaction tracking β Contact Lists: No address book or contact synchronizationPrivacy-Preserving Technologies
Pseudonymous Identity
Encrypted Message Storage
- Client-Side Encryption: Messages encrypted before transmission
- Zero-Knowledge Server: Server cannot decrypt message content
- Unique Chat Keys: Each conversation has separate encryption keys
- Forward Secrecy: Key rotation prevents historical message compromise
Minimal Analytics
User Privacy Rights
Right to Access
- Data Export: Download all your encrypted messages and data
- Audit Trail: Review all authentication and access events
- NFT Ownership: Verify your chat access tokens on the blockchain
- Account History: Access your account creation and activity logs
Right to Deletion
Right to Portability
- Message Export: Download encrypted messages in standard format
- NFT Transfer: Move chat access rights to different wallets
- Data Migration: Export data for use in other compatible services
- Backup Creation: Generate complete data backups
Right to Rectification
- Profile Updates: Modify any profile information
- Message Editing: Edit or delete your own messages
- Access Control: Transfer or revoke chat access permissions
- Consent Management: Update privacy preferences and consents
Blockchain Privacy Considerations
Public Blockchain Data
β οΈ Important Disclosure: Some data is permanently stored on the Solana blockchain and cannot be deleted:Publicly Visible Data
- Wallet Addresses: All Solana addresses are publicly visible
- NFT Ownership: Chat access NFT ownership is public record
- Transaction History: Blockchain transactions are permanently public
- Smart Contract Interactions: All contract interactions are auditable
Privacy Protection on Blockchain
Anonymous Features (Coming Soon)
Anonymous Messaging
- Temporary Wallets: Generate disposable wallet addresses
- Message Mixing: Obfuscate message timing and patterns
- Tor Integration: Route traffic through privacy networks
- Stealth Addresses: One-time use receiving addresses
Privacy-Enhanced Chat
- Self-Destructing Messages: Automatic message deletion
- Anonymous Group Chat: Privacy-preserving group messaging
- Hidden Participants: Obfuscated participant lists
- Private NFT Transfers: Anonymous chat access trading
Compliance & Regulations
GDPR Compliance (European Users)
β Lawful Basis: Legitimate interest for blockchain operations β Data Minimization: Only necessary data collected β Purpose Limitation: Data used only for stated purposes β Storage Limitation: Automatic data retention limits β User Rights: Full access, deletion, and portability rightsCCPA Compliance (California Users)
β Right to Know: Transparent data collection disclosure β Right to Delete: User-initiated data deletion β Right to Opt-Out: No personal information sales β Non-Discrimination: No service degradation for privacy requestsPrivacy by Design
- Proactive Measures: Privacy built into system architecture
- Default Settings: Maximum privacy as default configuration
- End-to-End Protection: Privacy throughout entire data lifecycle
- Transparency: Open-source privacy implementations
Third-Party Services
Service Providers
No Third-Party Tracking
- No Google Analytics: No behavioral tracking scripts
- No Social Media Pixels: No cross-platform tracking
- No Ad Networks: No advertising or retargeting
- No Data Brokers: No personal data sales or sharing
Privacy Monitoring
Privacy Audit Trail
Privacy Metrics
- Data Retention Rates: Monitor automatic data deletion
- User Rights Requests: Track privacy request fulfillment
- Encryption Coverage: Verify all sensitive data is encrypted
- Third-Party Compliance: Monitor service provider privacy practices
Privacy Best Practices
For Users
- Wallet Security: Keep your wallet private keys secure
- Address Privacy: Consider using different wallets for different purposes
- Message Awareness: Remember that message recipients can see content
- NFT Privacy: Understand that NFT ownership is publicly visible
- Regular Cleanup: Periodically delete old messages and media
For Developers
- Privacy by Design: Build privacy into every feature
- Data Minimization: Collect only absolutely necessary data
- Encryption First: Encrypt all sensitive data
- Regular Audits: Continuously review privacy implementations
- User Education: Clearly communicate privacy features and limitations
Future Privacy Enhancements
Planned Features
- Anonymous Messaging: Zero-knowledge proof-based anonymous chat
- Private Groups: Enhanced privacy for group conversations
- Decentralized Identity: Self-sovereign identity integration
- Privacy Coins: Support for privacy-focused cryptocurrencies
Research Areas
- Zero-Knowledge Proofs: Advanced cryptographic privacy
- Homomorphic Encryption: Computation on encrypted data
- Secure Multi-Party Computation: Private group operations
- Quantum-Resistant Privacy: Future-proof privacy technologies
