PRIVACY POLICY
DATA_PROTOCOL: DV8_E2EE_SHIELD // REV_MARCH_2026 // v1.3> ENCRYPTION_LEVEL: AES-256 / RSA-4096 / E2EE_ENABLED
01: CORE PRIVACY PHILOSOPHY
DV8 is engineered to be a "Zero-Knowledge" network. Our servers facilitate connections between nodes without possessing the technical ability to read your private communications. We collect the absolute minimum data required to maintain the Proximity Grid and secure the network against automated threats.
02: DATA SEGREGATION
| Data Type | Storage Location | DV8 Admin Access |
|---|---|---|
| Private Messages & Media | End-Device Only | NO (Encrypted) |
| Profile Photos (Public) | Secure Cloud | YES (For Moderation) |
| GPS Coordinates (Exact) | RAM Only (Volatile) | NO |
| Device Fingerprint (HWID) | Hashed Database | YES (For Security) |
03: LOCATION & DISCRETION
DV8 does not track your movements. Your location data is used strictly for the Proximity Grid:
- Live Fuzzing: Coordinates are fuzzed at the protocol level. We show distance, not precision.
- Ephemeral Nature: Location is only updated when the terminal is active. After 30 minutes of inactivity, your proximity data is purged from the active grid cache.
04: USER-CONTROLLED DISCRETION
We provide "Tactical Toggles" within the terminal settings to ensure you are in control of your visibility at all times:
- Incognito Mode: While active, your node remains invisible on the grid, but you can still view others.
- Sector Lockdown: Manually pin your location to a city center rather than using live proximity GPS.
- Message Self-Destruct: Optional settings to auto-purge your local chat history every 24 hours.
- Biometric Lock: Secure terminal access via your device’s fingerprint or face ID (processed locally on-device).
05: END-TO-END ENCRYPTION (E2EE)
Every private interaction is secured via the **DV8 Handshake**. When you initiate a chat, your device and the recipient's device exchange public keys. Your device encrypts the message locally. Our server delivers a locked "envelope" that only the recipient can open. We do not hold your private keys.
06: HARDWARE FINGERPRINTING
To prevent bot nets and maintain community integrity, we collect unique hardware identifiers. This data is **hashed** (irreversibly scrambled) so that we can identify a banned device without knowing personal owner details or serial numbers.
07: YOUR RIGHTS (GDPR/UK-DPA)
- Right to Erasure: Deleting your account triggers an immediate purge of your profile from the grid. Database cleanup cycles complete every 72 hours.
- Right to Access: You can view all profile data held by us within the "Edit Profile" section of the terminal.