Kyten Privacy Policy
Last Updated: February 3, 2026
At Kyten, we believe in Privacy by Design. This policy explains how we handle your information while ensuring the integrity of your digital assets.
1. Information We Collect
A. Information You Provide
Account Information: Name, email address, and billing information (processed by our payment providers).
Profile Data: If you choose to create a public "Creator Profile," we collect the bio, social links, and avatar you upload.
B. Information We Process (But Do Not "Collect")
Your Files: We do not collect or store your original files. All cryptographic hashing happens inside your web browser. The file never leaves your device.
File Hashes: We collect the cryptographic hash (a string of random-looking characters) of your file. This hash cannot be used to recreate the original file.
C. Technical Data
Usage Data: Browser type, IP address, and interaction logs to improve system performance and security.
2. How We Use Your Information
To Provide Proof: We use the File Hash to generate a timestamp and write a record for stamp on the fly.
To Verify: We use the Hash and signature to verify against the original file hash with public key.
4. Third-Party Sharing
We do not sell your data. We share data only with:
Payment Processors: To handle subscriptions (e.g., Stripe).
Storage Providers: If you explicitly choose our "Secure Archival" add-on, your encrypted file is stored with our decentralized storage partners.
5. Your Rights (GDPR & CCPA)
A. Offline Use (No Account Required)
Kyten can be used entirely offline without creating an account. When using Kyten offline:
- No personal information is collected or stored by Kyten.
- File processing (hashing) occurs locally on your device.
- If you choose to create verification records with timestamp on the Ethereum blockchain (premium feature), only the File Hash and Timestamp are recorded—no personal identifiers are linked to these records.
B. Account Holders
If you choose to create a Kyten account, you have the right to access, correct, or delete your personal data.
Right to Erasure ("Right to be Forgotten"): You can request the deletion of your Kyten account (email, name, billing history, profile data).
Limitation: We cannot delete the File Hashes or Timestamps recorded on the Public Integrity Ledger. These are immutable by design to ensure the integrity of verification proofs. However, deleting your Kyten account removes the link between your personal identity (email, name) and any public hashes you created, rendering those public records anonymous and unlinked to your identity.
6. Data Security
We use industry-standard encryption for data in transit (TLS) and data at rest. Since we do not possess your original files, a breach of Kyten servers cannot compromise the confidentiality of your documents, only your account metadata.
7. Changes to This Policy
We may update this policy to reflect changes in our technology or legal requirements. We will notify users of significant changes via email or a platform notification.
8. Contact Us
For privacy concerns or to exercise your data rights, please contact us at: khang.builder812@gmail.com.