Privacy Protocol

LAST UPDATED: DECEMBER 2025

The Key Foundation operates on a principle of absolute sovereignty. We believe that privacy is not a privilege, but a fundamental human right. This document outlines our minimal data practices, designed solely to facilitate encrypted communication without compromise.

1. Zero-Knowledge Architecture

The Key Foundation operates on a principle of absolute sovereignty. We believe that privacy is not a privilege, but a fundamental human right. This document outlines our minimal data practices, designed solely to facilitate encrypted communication without compromise.

2. Data Minimization

We collect only what is strictly necessary for the protocol to function:

  • Public Keys (for addressing)
  • Encrypted Message Blobs (temporarily, for delivery)
  • Connection Metadata (ephemeral, for routing)

3. Local Sovereignty

Your data lives on your device. We provide no cloud backups of unencrypted data. If you lose your device and your seed phrase, your data is gone forever. This is a feature, not a bug. It ensures that you are sole custodian of your digital life.

4. Content Moderation & Safety

Key is a peer-to-peer encrypted messaging protocol. Messages are stored on-chain and cannot be modified or deleted once confirmed. However, we are committed to maintaining a safe environment.

  • Zero Tolerance: Harassment, hate speech, explicit content, spam, illegal content is strictly prohibited
  • Blocking: Users can block anyone at any time. Blocked users cannot send messages
  • Reporting: Users can flag objectionable content. Reports are reviewed within 24 hours
  • Consequences: Users violating our policies will be permanently blocked from protocol
  • On-Chain Nature: Once messages are confirmed on Solana, they exist permanently on blockchain

4. Network Analytics

We do not use third-party analytics trackers (Google Analytics, Mixpanel, etc.) on our core messaging infrastructure. Our web gateway may collect basic, anonymized server logs for DDoS protection and uptime monitoring, which are purged regularly.

5. Modifications

The Key Foundation may update this protocol document as our technology evolves. Immutable updates will be broadcasted via our official signed channels.

6. Contact

For questions or to report violations:

Email: support@trykey.app