~~~
Scene 02Legal Compliance
Data retention protocols, encryption standards, and privacy safeguards.
Privacy Policy
// Last Modified: Nov 29, 2025
01
Protocol Overview
This document outlines the data collection and processing protocols utilized by the Vokna infrastructure. We prioritize high-density encryption and minimal data retention to ensure operator anonymity and asset security.
02
Ingestion Protocols
Authentication Data
Email identifiers and cross-protocol connect data (GitHub/Google) are stored for session establishment.
Neural Buffers
Text buffers and audio samples for cloning are encrypted at rest and utilized strictly for synthesis execution.
03
Encryption Standards
AES-256 Encryption at rest
TLS 1.3 Transmission protocols
Isolated neural processing nodes
Zero-knowledge synthesis pipelines
04
Operator Rights
Data Portability
Operators may request a full dump of associated neural profile data and project history at any time.
Erasure Protocol
Finalized account deletion triggers immediate purging of all associated neural buffers and asset nodes.
// End of Transmission