Privacy Policy
Last updated: December 26, 2025
Our Privacy Principle
Traceless Chat is built on end-to-end encryption. We designed the system so we cannot read your messages, even if we wanted to.
This isn't just a policy. it's a technical constraint built into the architecture.
1. What We Can Access
Due to our zero-knowledge architecture, we have extremely limited access to your data:
What we cannot access
- Message content (encrypted end-to-end)
- Files and media (encrypted before upload)
- Encryption keys (generated on your device)
- Contact lists (stored locally)
- Conversation metadata (minimal and encrypted)
What we can access
- Account identifiers (for routing)
- Public keys (for encryption)
- Connection metadata (timestamps, IP)
- Service usage metrics (aggregated)
2. How Encryption Works
Local Key Generation
Encryption keys are generated on your device. The private key never leaves your device.
Client-Side Encryption
Messages are encrypted on your device before being sent to our servers.
Server-Side Routing
Our servers handle encrypted data without the ability to decrypt it.
Local Decryption
Messages are decrypted on the recipient's device using their private key.
This architecture means we cannot read your messages, even under legal request.
3. Data Retention
Message Data
Encrypted messages are stored temporarily for delivery. For disappearing messages, encrypted data is deleted after the timer expires. We cannot access the content at any point.
Account Data
Account identifiers and public keys are retained while your account is active. If you delete your account, this data is removed from our systems.
Logs
Connection logs are retained for up to 30 days for operational purposes, then automatically deleted.
4. Third-Party Services
We use minimal third-party services for infrastructure:
- Hosting providers: For server infrastructure. These providers cannot access encrypted message content.
- Analytics: Aggregated, anonymous usage metrics that do not include message content or personal identifiers.
We do not sell or share your data with third parties for advertising or marketing purposes.
5. Your Control
Key Management
You control your encryption keys. If you lose your keys, we cannot recover them or the messages encrypted with them.
6. Policy Updates
We may update this privacy policy to reflect changes in our practices or for other operational, legal, or regulatory reasons. We will notify users of significant changes.
Questions
For questions about this privacy policy or our practices, contact us at shivanshulovescoding@gmail.com.