Privacy Policy
Your Privacy is Our Priority
Armory Atlas is built with Zero-Knowledge architecture, meaning we cannot and do not access your personal data. This policy explains exactly how we protect your privacy.
At Armory Atlas ("we," "us," or "our"), we are committed to protecting your privacy. This Privacy Policy explains how we handle information in connection with our website, mobile application, and services (collectively, the "Service"). Our Zero-Knowledge architecture ensures that your sensitive data remains private and secure at all times.
1. Zero-Knowledge Architecture
What Zero-Knowledge Means
Our Service is designed so that we have zero knowledge of your personal data. All sensitive information—including your firearm inventory, personal notes, documents, and other User Content—is encrypted locally on your device before being stored on our servers.
Client-Side Encryption
Your Master Encryption Key (MEK) is generated from your password using industry-standard key derivation functions (PBKDF2) and never leaves your device.
AES-GCM Encryption
We use AES-256-GCM encryption, a military-grade encryption standard, to protect your data both at rest and in transit.
No Recovery Possible
Because we don't have access to your MEK, we cannot recover your data if you lose your password. This is by design to ensure maximum privacy.
No Backdoors
We have not implemented any backdoors, master keys, or recovery mechanisms that would allow us to access your encrypted data.
2. Information We Collect
Data We CAN Access
- Account Information: Email address, account creation date, last login time
- Encrypted Data Blobs: Your encrypted data (which we cannot read or decrypt) will be sored on our servers
- Target photos: To analyze your target, we need encrypted images.
Data We CANNOT Access
- Technical Data: IP addresses, browser type, device information, operating system information send by your device - BUT WE NEVER STORE THESE DATA.
- Authenticated Usage Analytics: We do not run analytics after login, including inside the authenticated app experience or dashboard.
- Your Password or Master Encryption Key
- Your Firearm Inventory Details (make, model, serial numbers, etc.)
- Personal Notes and Documents
- Travel Itineraries or Location Data
- Any Content You Enter (all encrypted before leaving your device)
3. How We Use Information
We use the limited information we can access only for the following purposes:
Service Provision
To provide, maintain, and improve our Service functionality
Account Management
To manage your account, authenticate users, and prevent unauthorized access
Technical Support
To provide customer support and troubleshoot technical issues
Security Monitoring
To detect, prevent, and address security threats or fraudulent activity
4. Information Sharing and Disclosure
We Do NOT Share Your Encrypted Data
Your encrypted data is never shared, sold, or disclosed to any third party for any reason. Even if we wanted to, we cannot decrypt your data.
Government Requests: Even under legal compulsion, we can only provide what we have access to—which does not include your actual firearm data, personal notes, or any encrypted content.
Limited Non-Encrypted Data Sharing
We may share non-encrypted information only in these specific circumstances:
- • Service Providers: Trusted third parties who help us operate our Service (e.g., hosting providers, limited pre-login analytics services)
- • Legal Requirements: When required by law, court order, or to protect our rights
- • Safety: To protect the safety and security of our users or the public
- • Business Transfers: In connection with a merger, acquisition, or sale of assets (your encrypted data remains encrypted). You will have option to export your data and delete your account.
5. Data Security
Encryption Standards
- • AES-256-GCM encryption for data at rest
- • TLS 1.3 for data in transit
- • PBKDF2 for key derivation
- • Secure random number generation
Infrastructure Security
- • SOC 2 compliant hosting providers
- • Regular security audits and monitoring
- • Access controls and logging
- • Automated threat detection
6. Your Privacy Rights
Access
Request information about what non-encrypted data we have about you
Correction
Update or correct your account information
Deletion
Request deletion of your account and associated data
7. Data Retention
- • Account Data: Retained while your account is active, plus 30 days after deletion
- • Encrypted Data: Permanently deleted when you delete your account
- • Log Data: Typically retained for 90 days for security and debugging purposes
- • Analytics Data: Aggregated and anonymized data may be retained indefinitely
8. Cookies and Tracking
Essential Cookies
Required for authentication and basic functionality
Analytics
Anonymous analytics are limited to public, pre-login pages. After login, analytics are disabled and do not run in the authenticated product experience.
9. International Data Transfers
Our servers are located in the United States. If you are accessing our Service from outside the U.S., please note that your encrypted data will be transferred to and stored in the United States. However, because your data is encrypted with keys we don't possess, the location of storage does not impact your privacy.
10. Contact Us
If you have any questions about this Privacy Policy or our privacy practices, please contact us:
Email: [email protected]
Response Time: We typically respond to privacy inquiries within 72 hours.
11. Changes to This Policy
We may update this Privacy Policy from time to time. We will notify you of any material changes by:
- • Posting the new Privacy Policy on this page
- • Updating the "Last Updated" date
- • Sending you an email notification (for significant changes)
- • Displaying a prominent notice in the Service
