speakerНОВОЕ!iShredder™ Business для iOS и Android теперь доступен для корпоративных клиентов.Узнать больше

Как Protectstar защищает вашу конфиденциальность — ваша приватность под надежной защитой с нами!

Как Protectstar защищает вашу конфиденциальность — ваша приватность под надежной защитой с нами!
October 07, 2024

Data privacy is more important than ever. In an era of data breach scandals and increasing surveillance, more and more people are asking: "Is my information really safe?" Companies often collect more data than users realize and use it for commercial purposes. At Protectstar Inc., we take a different approach: we are fully committed to protecting your data, giving you complete control, and transparently explaining what data we collect — and why. In this blog, you will learn how Protectstar protects your privacy and why you can trust us.

Do we collect personal data?
Absolutely NOT!
At Protectstar, we strive to respect your data. Unlike many other companies, we do not collect or store any personal data that could be linked to you as an individual. We do not sell or share your data with third parties. With our apps, you can be confident that your personal information remains truly private.
 

What data do we collect and why?
Although we do not collect personal data, we collect technical information necessary for the full functionality of our applications (only for Anti Spy, Antivirus AI, and Firewall AI) and for optimal protection of you. This data collection is always carried out on a minimization principle — we collect only the necessary data for early detection and prevention of threats. Here are the main points:

  • Names of applications on your device
    We collect the names of applications installed on your device. This helps us identify apps that may be vulnerable to threats such as malware or spyware. Don’t worry — we do not access the contents of these applications.
  • Digital fingerprints (MD5 and SHA-256)
    A digital fingerprint, also known as a checksum, is a unique code generated based on the contents of a file or application. This code allows us to verify that no file or application on your device has been altered. Important: we collect only the fingerprint, not the file or application itself!
  • File checksums
    Just like with applications, we create digital fingerprints for files to ensure they have not been altered and are protected. Again, we do not have access to the contents of the files.
     

How do we use this data?
The collected data serves one sole purpose: your security. Here’s how we use it:

  • Security analysis: We use application names and checksums to scan your device for malware or other potential threats.
  • Threat detection: Using checksums, we can determine if an application or file has been modified.
  • Performance optimization: We offload heavy analysis to our secure cloud servers to avoid unnecessary load on your device.

All these checksums are anonymized and encrypted (AES-256) before being sent to our servers. You can be confident that your information is protected from unauthorized access.
 

Efficient threat analysis in the cloud
To avoid overloading your device, we transfer heavy security analysis to our secure cloud servers Protectstar AI. This allows maintaining high performance of your device while ensuring security.
Of course, all data is encrypted (AES-256) and transmitted over a secure channel.
 

Why you can trust us
Trust is a key factor in everything, especially when it comes to security. At Protectstar, we adhere to the highest standards to ensure the protection of your data:

Была ли эта статья полезной? Да Нет
38 из 38 пользователей сочли эту статью полезной
Отмена Отправить
Back Вернуться назад