~~~
Scene 02Legal Compliance

Data retention protocols, encryption standards, and privacy safeguards.

Privacy Policy

// Last Modified: Nov 29, 2025

01

Protocol Overview

This document outlines the data collection and processing protocols utilized by the Vokna infrastructure. We prioritize high-density encryption and minimal data retention to ensure operator anonymity and asset security.

02

Ingestion Protocols

Authentication Data

Email identifiers and cross-protocol connect data (GitHub/Google) are stored for session establishment.

Neural Buffers

Text buffers and audio samples for cloning are encrypted at rest and utilized strictly for synthesis execution.

03

Encryption Standards

AES-256 Encryption at rest
TLS 1.3 Transmission protocols
Isolated neural processing nodes
Zero-knowledge synthesis pipelines
04

Operator Rights

Data Portability

Operators may request a full dump of associated neural profile data and project history at any time.

Erasure Protocol

Finalized account deletion triggers immediate purging of all associated neural buffers and asset nodes.

// End of Transmission

Privacy Inquiries?

[email protected]
Privacy Policy | Vokna | Vokna