PRIVACY MANIFESTO

LOG_ID: POLICY_V2.0 // ENCRYPTION: ACTIVE

You're trusting me with your data. I take that personally.

README.md SIZE: 2KB
## TL;DR: THE EXECUTIVE SUMMARY
---------------------------------------------------
> WHO AM I?     : Solo Engineer. Not a faceless corp.
> DATA SALES?   : NULL. I don't sell data. Ever.
> SECURITY?     : Enterprise-grade. I eat my own dog food.
> TRACKING?     : Minimal telemetry for functionality.
> YOUR RIGHTS?  : Root access. It's your data.

[STATUS]: Systems Secure. Read full logs below.
    

LAST_UPDATE: 2026-01-01 | STATUS: EFFECTIVE

00 // THE MISSION

N
FROM THE DESK OF THE OPERATOR

I’m not a Silicon Valley unicorn or a legacy enterprise. I’m a solo cybersecurity engineer building tools that actually protect people because I’ve seen what happens when security is just a checkbox.

This privacy policy isn’t legal theater; it’s a commitment backed by real infrastructure and real expertise. You’re trusting me with your data. I protect your assets with the same paranoia and precision I apply to my own systems.

< > -------------------------------------------------- < >

01 // INPUT STREAMS (Collection)

To run this operation and provide you with security services, I have to collect certain data points. I keep this lean—if I don't need it, I don't touch it.

SOURCE: USER_INPUT TYPE: DIRECT
  • >> Identity Data: Name, email, handle. The basics to know who I'm talking to.
  • >> Billing Data: Processed via Stripe/PayPal. I never see your raw credit card numbers. I don't want that liability.
  • >> Project Specs: Information about your infrastructure that you provide so I can secure it.
SOURCE: SYSTEM_LOGS TYPE: TELEMETRY

When you hit my servers, the system logs standard metadata. This is used for threat detection (blocking bots) and debugging.

  • - IP_ADDRESS (For geofencing & blacklisting)
  • - USER_AGENT (Browser fingerprint)
  • - COOKIES (Session management only)

02 // PROCESSING & OPERATIONS

I don't mine your data for ad targeting. I use it to execute the contract. Here is the logic flow:

  • Service Execution: To deliver the pentest, audit, or code you paid for.
  • Comms: To send you reports, invoices, or critical security alerts (e.g., "Patch this now").
  • Defense: My IDS (Intrusion Detection System) analyzes traffic patterns to stop attacks against my infrastructure—and yours.

03 // DATA EXFILTRATION PROTOCOLS

In corporate speak, this is "Information Sharing." Here is the reality:

I do not sell your data. I do not rent your data.

However, I'm not running a server farm in a cave. I use trusted third-party infrastructure to operate. Data is shared strictly on a need-to-know basis with:

  • [ PAYMENT ] : Stripe / PayPal (Encrypted tunnels)
  • [ HOSTING ] : AWS / DigitalOcean (Secure enclaves)
  • [ LEGAL ] : Only if a court order forces my hand (and I will fight overreach).
/* ---------------- SECURITY_LEVEL == HIGH ---------------- */

04 // DEFENSE MECHANISMS

Most companies say "we value security" while storing passwords in plain text. I actually do this for a living.

ENCRYPTION

Data at rest is encrypted (AES-256). Data in transit is forced over TLS 1.3. No cleartext protocols allowed.

ACCESS CONTROL

I am the only admin. MFA (YubiKey) is enforced on all root accounts. No "intern" has access to your files.

Note: While I deploy fortress-level security, the internet is a hostile environment. No system is 100% impenetrable. If a breach occurs, I will notify you with total transparency—no PR spin.

05 // THE NO-BS GUARANTEE

MODULE: TRUST STATUS: VERIFIED

1. I won't spam you. My newsletter is opt-in only. If you unsubscribe, you're gone from the list instantly.

2. You own your data. Want a data dump? Want to be deleted? Send the command, and I’ll execute `rm -rf` on your records (barring legal retention requirements).

3. Transparency first. If I change this policy, I’ll tell you why. No stealth edits.

06 // ESTABLISH COMMS

Have a concern? Found a bug? Just want to verify I'm human?

OPERATOR: Niffy
CHANNEL: Encrypted Contact Form
RESPONSE_TIME: < 24 Hours

END_OF_FILE

Building the next-gen infrastructure, one client at a time.