o
|
\
|
1.
0
n_
|
~
|
4T
Infrastructure
Research
Tools
Ethics
Home
/ Ethics
Operational Transparency and User Sovereignty
Ethics here are not aspirational. They are enforced through system behavior.
Policies
Logging Policy
Logs exist only where operationally unavoidable, with defined retention and deletion
Data Deletion
User-initiated deletion is immediate, irreversible, and verifiable
Threat Model
What we defend against, what we do not, and where responsibility lies