“Confidentiality and Security” version of 01/12/2024 (1st version). The versions will be logged and accessible on this page.
Distinction between “followed nicknames” and “contacts”
The term "contact" is used for people whose email addresses you know and who you have added in the "Contacts" tab
The term "pseudo following" is used when a user follows another user's posts within the "Discussions" tab
Following a nickname in the "Discussion" tab does not make them a contact in the "Contacts" tab
Having a contact in the "Contacts" tab does not automatically trigger the follow-up of this contact in the "Discussions" tab
In the "Discussions" tab, the following data is visible to all other users:
Pseudo,
your logo if you add one via the “Options” tab,
number of nicknames that follow you,
Registration date,
Number of posts, and one click allows you to see all your posts.
Number of post shares,
Number of comments on posts,
Number of likes,
Number of Dislikes,
Date of last activity,
Likely in the future, but not sure:
Number of nicknames that follow you,
List of nicknames you follow,
List of people who follow you
In the "Contacts" tab and in the "Geolocation" tab, a contact is:
a person that you add as a contact via the "Creation" button in the "Contacts" tab (by indicating their email address, an email address which is not initially provided by us)
a person whose contact request you accept or ignore (so this is a person who knows your email address)
In the future, additions can also be made by telephone number (which applies to email addresses in the two sentences above, will also apply to telephone numbers)
Mechanics of a contact request (valid inversely if you are the one sending the request...):
Someone who knows your email address can add you as a contact,
You then receive an invitation that you can accept or ignore,
In this invitation, his email address, his nickname and the temporary nickname he chose to identify you in his list are presented to you,
You can already determine whether or not you accept his invitation. example “I know I accept, I don’t know I don’t know”
The contacts that you have ignored are still accessible by checking the "ignored" option in the list of contacts in order to accept them deferred for reasons that we can guess (verification on your part by another communication channel for example),
You can delete a contact, if you delete a contact that you previously accepted, this contact will be visible with the "ignored" option, it becomes an "ignored" contact
regarding your contacts, once they have been accepted:
You can then communicate with them via video calls (these calls are peer to peer unless using a relay server, relay option which is disabled by default)
If you each have the Android or IOS app installed, you can communicate with each other via private text messages.
Concerning private text messages via the Android and IOS applications (click on the contact envelope in the "Contacts" tab which appears after adding the contact):
3 entities communicate in this way:
Your Android or IOS Device with our HTTPS server
then our HTTPS server with the recipient's IOS or Android device.
Storage on IOS or ANDROID devices
Messages are stored in plain text in the local database of your IOS or Android device.
You can delete your messages stored in the local IOS or Android database by clicking on the contact envelope (envelope which appears delayed once the person has been added), then by clicking on the trash can at the top right. or delete them one by one by sliding your finger on them sideways.
* Storing your private messages on the HTTPS server:
We undertake not to read your messages if they are not intended for us as “Contact”.
Asymmetric RSA end-to-end encryption is disabled because we are awaiting administrative feedback from the French state following the declaration of 12/27/2023, declaration requested at least by Apple to use this encryption on an application available in the AppleStore
Your messages are therefore currently stored in the database so that they are unreadable at first glance. (base64 encoding).
Currently we do not automatically delete delivered messages but we are considering it, so it is possible at the time you read this commitment that messages will be deleted from the server once delivered to recipients.
Future: once we receive permission to use asymmetric RSA encryption (date undetermined, possibly never), new messages will be encrypted by your device with your recipient's public key and only your recipient will be able to decrypt them using the private key that only he controls. (this is already technically in place but disabled and cannot be activated by users). So even the HTTPS server will not be able to decrypt your private text messages.
Usage data is stored on our HTTPS server (call history for example) but may be automatically deleted when you read this confidentiality commitment (in order to optimize our database, which is deletable will be deleted).
You can delete your account at any time by clicking on the "Delete my account" button in the "Options" tab.
If you delete your account, all data about you is automatically deleted.
The only thing that remains in the database is the trace of email sendings from us to you (made during account creation, during the recall of identifiers and in the case where someone invites you to contact). This is to be able to manage the “no longer receive emails from us” link present in the body of all our automatic email messages.
Geolocation tab:
In the "Options" tab, you can activate geolocation, you are then geolocated if you have installed the IOS or ANDROID application
Your geolocation is then sent to our server approximately every 30 minutes, we do not keep in memory the history of your geolocations but only the last one.
By default, none of your contacts receive your geolocation, it is up to you to activate this sharing if you decide to do so via the contact tab by checking the "share my location" box in the settings of the given contact
You can uncheck this last box if you have previously checked it, the effect will be that your contact will no longer receive your new positions
All the means that we know today are implemented to avoid piracy. Examples:
Automatic banning of questionable IP addresses for 6 months on the first access identified as questionable,
Opening inbound ports only for known and legitimate protocols,
Regular updating of our infrastructure in terms of operating systems and software.
Priority use of operating systems and Open Source software
For updates, a complete and fairly quick restart (approximately 5 minutes) generally takes place every first Saturday of the month in the morning.
The stored data remains between us and you, there are no third parties.