Privacy Policy
Effective Date: 15 April 2026
1. Introduction
Atopos Labs ("Atopos", "we", "our", or "us") provides encrypted communication rooms designed for private collaboration. This Privacy Policy explains what information we collect and how we handle it.
2. Information We Collect
We intentionally minimize data collection.
Depending on usage, we may collect:
- Email address (if voluntarily provided for support)
- Transaction identifiers related to token purchases
- Basic technical logs necessary for service security and abuse prevention
Payment information is processed directly by Stripe, our third-party payment processor. We do not store full payment card details.
3. What We Do Not Collect
We intentionally minimize personal data collection and do not retain or process personal information about you unless you voluntarily provide it for specific purposes.
We do not collect or store:
- Message content
- Room content
- Encryption keys
- One-time secrets
- Personally identifiable data except email addresses voluntarily provided for support inquiries
Messages are end-to-end encrypted and are not stored on our servers.
4. Payment Processing
Payments are processed by Stripe as a third-party provider. We do not store full payment card details. We retain only minimal operational data necessary for billing and security. Stripe may collect personal and payment information in accordance with their own Privacy Policy.
5. Monero Payments
When paying with Monero, we generate a one-time subaddress for each transaction. We do not store wallet addresses, payment amounts, or transaction IDs after token issuance. Payment records are deleted after tokens are delivered. No identity linkage exists between Monero payments and token usage.
6. CLI Tool
The Atopos Elite CLI operates entirely on your device. It makes no network calls for ceremony operations. No telemetry, analytics, or usage data is collected by the CLI.
7. Data Retention
We retain only the minimal operational and billing records required for security, fraud prevention, and legal compliance.
8. Security
We implement technical safeguards including encryption, access controls, and minimal data retention principles.
9. Your Rights
Depending on your jurisdiction, you may request access to or deletion of personal information we hold about you.