1. COMMON ACCESS TO YOUR PERSONAL DATA
We never share your personal data with anyone. We remove/delete all your messages and files immediately from our servers as soon as they reach all recipients.
2. STORING DATA
AEGEES only stores the data it needs to function properly as long as you use AEGEES.
AEGEES uses end-to-end encryption. This means that we don’t store your messages as well as we don’t keep any logs for messages. For the security reasons your messages are not kept on our servers after delivery to the recipient, you can only access those messages from the device they were sent to or from. When you send photos, videos or files via chats, before being uploaded each item is encrypted with a separate key, not known to the server. This key and the file’s location are then encrypted again, this time with the secret chat’s key and sent to your recipient. This means that the file is technically on one of AEGEES’s servers, but actually it looks like a set of unconnected encrypted symbols to everyone except you and the recipient. After the file delivery the information about it is removed from our server immediately.
AEGEES uses different identifiers such as your login and password, e-mail or phone number. We ask your permission before syncing your contacts. We don’t store your contacts on our servers.
5. DELETING DATA
If you would like to delete your account, you can do this on the deactivating page. Deleting your account permanently removes all your messages, groups and contacts. This action must be confirmed via your AEGEES account and cannot be undone.
When you delete a message from your history it is automatically deleted from all devices of all recipients as soon as they get online.
1. PERSONAL INFORMATION/DATA
We don’t sell or provide your personal information to anyone as you don’t provide it to us. As a registered user you can view and change your personal information at any time by using your App personal account.
2. SECURITY MEASURES
We take technical, physical and administrative measures for your personal data protection from such threats as Network Traffic Capture, Loss of the User’s Device (phone), Spoofing the Caller’s SIM card, Spoofing of the User’s Device, Coercion of the Owner of the User’s Device (phone) into revealing of the authorization data and other threats. Some of our protection methods include network screens, data encryption, control over physical access to our Data processing centers, denial of storing your Personally identifiable information on our servers, international distributed infrastructure resistant to any locks.
3. OUR CONTACTS