Skip to main content
All CollectionsPrivacy
Privacy With Ghost
Privacy With Ghost
J
Written by John Duszynski
Updated over 4 months ago

At Ghost, safeguarding your privacy is our utmost priority with our Confidential Cloud. Enjoy the advantages of personalized AI without sacrificing your privacy.

Encryption of Your Data We use data keys to encrypt your information, which are themselves encrypted under a secret key. This means no one, including us, can access the secret keys.

Anonymization of Your Data Your application request is initially mapped to an anonymous ID, and after that, even we cannot identify whose encrypted data belongs to whom.

Commitment to Not Selling Your Data We promise never to sell your data or access it without your permission. We enforce immutable audit logs and strict code review policies.

Legal Protection for Your Data The Fifth Amendment protects you from having to produce incriminating documents. You can file a motion to quash any subpoena for your Ghost data.

Protection Against Physical Tampering Decrypted data is only stored in memory, protected by a multi-chip standalone hardware cryptographic appliance.

Protection from Employers and Government Neither your employer nor the government can decrypt your data. Even if subpoenaed, the data would be indecipherable due to our encryption methods.

Pendant - Consent Mode The Pendant includes "Consent Mode," which records only the voices of those who have given consent. It uses voice identification to determine who is speaking and a verbal opt-in to streamline the consent process.

Did this answer your question?