Privacy Protocol.
01. Information Acquisition
We process three vectors of data: Authentication (identity), Technical (browser/device fingerprinting), and Creative (base images and text prompts). All creative vectors are used solely for generation and are never sold to external data brokers.
02. Model Training
Your inputs are not used to train global base models without explicit authorization. We value the proprietary nature of your creative styles. You may opt-in to 'Fine-Tuning' for personalized style persistence.
03. Security Layers
All data is transmitted via military-grade TLS 1.3 encryption. Internal access to creative assets is restricted to mission-critical personnel only during active debugging sessions.
04. Right to Erasure
You maintain full sovereignty over your data. Upon request, all metadata, creative assets, and terminal logs associated with your identity will be permanently wiped from our secure storage nodes.
