Operational Transparency and User Sovereignty

Ethics here are not aspirational. They are enforced through system behavior.


Policies

Logging Policy Logs exist only where operationally unavoidable, with defined retention and deletion Data Deletion User-initiated deletion is immediate, irreversible, and verifiable Threat Model What we defend against, what we do not, and where responsibility lies