For all users, we log incoming HTTP request URLs for troubleshooting and abuse prevention purposes. We may manually access these URLs if we suspect phishing or other abuse.
For registered users, we collect and store their email address and associated SSH public key fingerprints for identification purposes.
We use the information we collect to operate and improve our service, respond to user inquiries and requests, and prevent fraud and abuse.
We may also use aggregated and anonymized information for analytics and research purposes.
We do not share or sell user information to third parties, except as required by law.
We may disclose user information to our service providers, contractors, and other third-party vendors who perform services on our behalf, such as data processing, email delivery, and customer support.
We may also share user information with our affiliates, successors, or assigns in connection with a business transaction, such as a merger, acquisition, or sale of assets.
We take reasonable measures to protect user information from unauthorized access, disclosure, alteration, or destruction. However, no data transmission over the internet or method of electronic storage can be guaranteed to be 100% secure.
We encourage users to take steps to protect their own information, such as using strong passwords and keeping their SSH private keys secure.