Privacy Policy

Privacy by Default.

Our commitment to your privacy and data protection.

Last Updated: December 7, 2025

Introduction

Welcome to noid room. This Privacy Policy explains our approach to privacy and data protection. Unlike traditional services, we have designed our platform with privacy as the default setting, not as an optional feature.

Our core principle is simple: We cannot share, sell, or misuse data we never collect in the first place.

What We Don't Collect

We do not collect, store, or process:

  • Personal identification information
  • IP addresses or connection metadata
  • Browser fingerprints
  • Usage analytics or behavioral data
  • Cookies or tracking pixels
  • Payment information
  • Message content
  • Audio streams

How Our Platform Works

When you create a room, we generate a unique encrypted URL. This URL contains all the information needed to access the room - we don't store room access lists or participant information on our servers.

All communications use real-time relay technology. Messages and audio are transmitted through our server to all room participants but are never stored or logged on our servers.

Zero Storage

We do not store any communication data on our servers:

  • Messages are relayed through our server to participants in real-time
  • No messages or audio are stored on our servers
  • We only maintain room metadata (ID, expiration time)
  • No message history is kept or logged
  • No backups or archives exist

Legal Requests

If we receive legal requests for user data, we have nothing to provide. We do not maintain:

  • User databases or account information
  • Communication logs, message history, or audio recordings
  • Connection records or IP addresses
  • Payment information (crypto transactions are public on blockchain)

We designed our system as a relay-only architecture specifically so communication is never stored on our servers, protecting your privacy even from ourselves.

Security Measures

End-to-End Encryption

Military-grade encryption for all communications

Zero-Knowledge Architecture

We cannot access your encrypted data

Secure Infrastructure

Hardened servers with minimal attack surface

Regular Security Audits

Independent security assessments

Your Rights

Since we don't collect personal data, traditional privacy rights (access, rectification, deletion) don't apply - there's simply no data to access, correct, or delete.

You maintain complete control over your communications. Messages are relayed in real-time only, and you can leave rooms at any time. When the room expires, the room metadata is removed from our system.

Changes to This Policy

We may update this Privacy Policy occasionally to reflect changes in our practices or for legal compliance. Any changes will be posted on this page with an updated "Last Updated" date.

However, our fundamental commitment to minimal data collection and user privacy will never change.

Contact Us

If you have questions about this Privacy Policy, please reach out through our support channels.