Privacy Protocol
LAST UPDATED: DECEMBER 2025
The Key Foundation operates on a principle of absolute sovereignty. We believe that privacy is not a privilege, but a fundamental human right. This document outlines our minimal data practices, designed solely to facilitate encrypted communication without compromise.
1. Zero-Knowledge Architecture
The Key Foundation operates on a principle of absolute sovereignty. We believe that privacy is not a privilege, but a fundamental human right. This document outlines our minimal data practices, designed solely to facilitate encrypted communication without compromise.
2. Data Minimization
We collect only what is strictly necessary for the protocol to function:
- Public Keys (for addressing)
- Encrypted Message Blobs (temporarily, for delivery)
- Connection Metadata (ephemeral, for routing)
3. Local Sovereignty
Your data lives on your device. We provide no cloud backups of unencrypted data. If you lose your device and your seed phrase, your data is gone forever. This is a feature, not a bug. It ensures that you are sole custodian of your digital life.
4. Content Moderation & Safety
Key is a peer-to-peer encrypted messaging protocol. Messages are stored on-chain and cannot be modified or deleted once confirmed. However, we are committed to maintaining a safe environment.
- Zero Tolerance: Harassment, hate speech, explicit content, spam, illegal content is strictly prohibited
- Blocking: Users can block anyone at any time. Blocked users cannot send messages
- Reporting: Users can flag objectionable content. Reports are reviewed within 24 hours
- Consequences: Users violating our policies will be permanently blocked from protocol
- On-Chain Nature: Once messages are confirmed on Solana, they exist permanently on blockchain
4. Network Analytics
We do not use third-party analytics trackers (Google Analytics, Mixpanel, etc.) on our core messaging infrastructure. Our web gateway may collect basic, anonymized server logs for DDoS protection and uptime monitoring, which are purged regularly.
5. Modifications
The Key Foundation may update this protocol document as our technology evolves. Immutable updates will be broadcasted via our official signed channels.
6. Contact
For questions or to report violations:
Email: support@trykey.app