Privacy Policy

Effective Date: October 24, 2025

Last Updated: October 24, 2025

Privacy-First Commitment: GeckoShare is built on a zero-knowledge architecture. We use end-to-end encryption, which means we CANNOT access, read, or view the contents of your files. This Privacy Policy explains what limited data we do collect and how we protect it.

1. Introduction and Scope

1.1 Who We Are

GeckoShare ("we," "us," "our") operates a secure, temporary file-sharing platform at geckoshare.com and related domains (app.geckoshare.com, api.geckoshare.com). We are committed to protecting your privacy and complying with global data protection regulations.

1.2 What This Policy Covers

This Privacy Policy describes:

1.3 Applicable Laws

GeckoShare complies with:

1.4 Changes to This Policy

We may update this Privacy Policy from time to time. When we make material changes:

Continued use of GeckoShare after changes take effect constitutes acceptance of the updated policy.

2. Information We Collect (Guest Users)

Data Minimization: Guest users can use GeckoShare completely anonymously. No account registration, email address, or personal information is required to upload and share files.

2.1 File Metadata (Minimal Collection)

When you upload a file as a guest, we collect:

Data Type What We Collect What We DO NOT Collect
File Size Encrypted file size in bytes File contents (encrypted on your device)
File Type MIME type (e.g., "application/pdf") Actual file name (encrypted on your device)
Upload Time Timestamp when file was uploaded User identity or account information
Expiration Date When file will be auto-deleted (24 hours) File encryption keys (never transmitted to us)
Short Link Code 8-character random identifier (e.g., "h2m45d7L") Identifiable user information

2.2 Technical Information (Abuse Prevention)

To prevent abuse, spam, and security threats, we collect:

Legal Basis (GDPR Article 6): Legitimate interest - Preventing abuse, fraud, malware distribution, and violations of our Terms of Service.

Retention Period: IP addresses are retained for 90 days after file deletion, then permanently deleted.

2.3 What We CANNOT Access (Zero-Knowledge Encryption)

Due to end-to-end encryption, we CANNOT and DO NOT collect:

2.4 Cookies and Local Storage (Guest Users)

Guest users do NOT require cookies for core functionality. We may use:

No Tracking or Analytics Cookies: Guest users are not tracked across websites or sessions. We do not use third-party analytics for guest uploads.

3. Pro Tier Data Collection and Processing

Pro Users - Enhanced Data Collection: To provide Pro tier features (File Vault, 7-day retention, unlimited downloads), we collect additional information when you connect a Solana wallet. This section explains what we collect, why, and your rights.

3.1 Wallet Information (Blockchain Data)

What We Collect:

Data Type Description Example
Public Wallet Address Your Solana wallet's public key (blockchain identifier) 7xKxY2w...9AbcDEF (base58 encoded)
PRICKO Token Balance Number of PRICKO tokens in your wallet (read-only query) 12,500 PRICKO tokens
Wallet Connection Timestamp When you connected/disconnected your wallet 2025-10-24 14:32:18 UTC
Token Balance Check History Timestamps of token balance verifications Last checked: 2025-10-24 15:00:00 UTC

What We DO NOT Collect:

How We Collect This:

Legal Basis (GDPR Article 6):

Retention Period: Wallet address and connection history are retained for 90 days after your last connection. After 90 days of inactivity, this data is permanently deleted.

3.2 File Vault Metadata (Pro Users)

For files uploaded to your Pro tier File Vault, we collect enhanced metadata:

Data Type Purpose Retention
Encrypted Filename Display filename in Vault UI (client-side decryption only - we cannot read it) Until file expiration or manual deletion
File Size Enforce 20GB storage limit and display usage metrics 90 days after file deletion
MIME Type Display file type icon in Vault UI 90 days after file deletion
Upload Timestamp Display upload date/time in Vault UI 90 days after file deletion
Expiration Date Enforce 7-day maximum retention and display countdown timer 90 days after file deletion
Custom Expiration Settings Honor user-selected expiration (1-7 days) 90 days after file deletion
Download Count Display how many times file was accessed 90 days after file deletion
Storage Bucket Location Internal identifier for S3 storage (Hetzner Object Storage) 90 days after file deletion

Legal Basis (GDPR Article 6):

Retention Period:

3.3 Access Logs (Pro Users)

We log access events for files in your Pro tier Vault:

What We Log:

Why We Log This:

Legal Basis (GDPR Article 6): Legitimate interest - Fraud prevention, security monitoring, and service abuse detection.

Retention Period: Access logs are retained for 90 days after file deletion, then permanently deleted.

Your Rights: You may request deletion of access logs by emailing privacy@privacygecko.com. We will delete logs within 30 days unless retention is legally required (e.g., active law enforcement investigation).

3.4 Third-Party Services (Pro Users)

Pro tier features rely on external services that process your data:

3.4.1 Solana Blockchain (Public Network)

3.4.2 Solana RPC Providers (Third-Party APIs)

3.4.3 Hetzner Object Storage (File Storage)

3.5 Your Privacy Rights (Pro Users)

Under GDPR, CCPA, and other privacy laws, you have the following rights regarding your personal data:

Right to Access (GDPR Article 15, CCPA § 1798.100)

You may request a copy of all personal data we hold about you, including:

How to Request: Email privacy@privacygecko.com or submit a GDPR Data Request.

Response Time: We will respond within 30 days (GDPR) or 45 days (CCPA).

Right to Deletion / Right to be Forgotten (GDPR Article 17, CCPA § 1798.105)

You may request deletion of your personal data, including:

Limitations: We may retain data if legally required (e.g., active law enforcement investigation, pending legal claims).

How to Request: Email privacy@privacygecko.com with "Deletion Request" in the subject line.

Response Time: We will delete data within 30 days of verification.

Right to Data Portability (GDPR Article 20)

You may request a machine-readable export of your data, including:

Format: We provide data in structured JSON or CSV format for easy import into other services.

How to Request: Submit a Data Portability Request.

Right to Rectification (GDPR Article 16)

You may request correction of inaccurate or incomplete personal data.

Example: If we have an incorrect wallet address on file, you can request we update it.

How to Request: Email privacy@privacygecko.com.

Right to Object (GDPR Article 21)

You may object to processing of your personal data based on legitimate interest (e.g., access logging).

Impact: If you object to access logging, we may need to disable Pro tier features that depend on it (download tracking).

How to Request: Email privacy@privacygecko.com.

Right to Restrict Processing (GDPR Article 18)

You may request temporary suspension of data processing while we investigate a dispute or verify data accuracy.

How to Request: Email privacy@privacygecko.com.

Right to Withdraw Consent

If we process your data based on consent (e.g., optional analytics), you may withdraw consent at any time.

Impact: Withdrawal does not affect the lawfulness of processing before withdrawal.

How to Withdraw: Disconnect your wallet or email privacy@privacygecko.com.

4. How We Use Your Information

We use collected information ONLY for the following purposes:

4.1 Core Service Operations

4.2 Pro Tier Feature Provisioning

4.3 Security and Abuse Prevention

4.4 Service Improvement (Aggregated Data Only)

No Individual User Tracking: We do NOT track individual users across sessions or create user profiles. Analytics are aggregated and anonymized.

5. Data Retention Periods

Data Type User Tier Retention Period Reason
Encrypted Files Guest 24 hours OR 1 download (whichever first) Core service feature
Encrypted Files Pro Up to 7 days (or manual deletion) Pro tier benefit
File Metadata Guest 90 days after file deletion Abuse prevention, security monitoring
Vault Metadata Pro 90 days after file deletion Abuse prevention, security monitoring
IP Addresses All 90 days after file deletion Fraud prevention, rate limiting
Access Logs Pro 90 days after file deletion Security monitoring, user visibility
Wallet Address Pro 90 days after last connection Pro tier eligibility verification
Token Balance History Pro 90 days after last check Audit trail for Pro tier access
Encryption Keys All NEVER (we don't have them) Zero-knowledge architecture

5.1 Automatic Deletion

All data is automatically deleted according to the retention periods above. We use automated cleanup jobs that run:

5.2 Early Deletion on Request

You may request early deletion of your data at any time by emailing privacy@privacygecko.com. We will delete data within 30 days unless legal retention is required.

6. Legal Basis for Processing (GDPR Compliance)

Under GDPR Article 6, we must have a legal basis to process your personal data. Here's our legal basis for each processing activity:

Processing Activity Legal Basis GDPR Article
Storing encrypted files Contract Performance - Necessary to provide file-sharing service Article 6(1)(b)
Collecting IP addresses for abuse prevention Legitimate Interest - Preventing fraud, spam, and service abuse Article 6(1)(f)
Verifying PRICKO token balance Legitimate Interest - Verifying eligibility for requested Pro tier features Article 6(1)(f)
Providing File Vault features Contract Performance - Necessary to provide Pro tier services you opted into Article 6(1)(b)
Logging Pro tier file access Legitimate Interest - Security monitoring and fraud prevention Article 6(1)(f)
Retaining metadata for 90 days Legitimate Interest - Abuse prevention, legal compliance, security investigations Article 6(1)(f)
Responding to law enforcement requests Legal Obligation - Compliance with valid subpoenas, court orders, or statutory duties Article 6(1)(c)
Optional analytics (if implemented) Consent - You can opt in/out of non-essential analytics Article 6(1)(a)

6.1 Legitimate Interest Balancing Test

When we rely on "legitimate interest" as the legal basis, we balance our interests against your privacy rights:

Example - IP Address Logging:

You may object to processing based on legitimate interest by emailing privacy@privacygecko.com. We will assess your objection and stop processing unless we have compelling legitimate grounds that override your interests.

7. Data Security and Encryption

Zero-Knowledge Security: GeckoShare is designed so that even if our servers are compromised, your file contents remain secure because we never have access to encryption keys.

7.1 End-to-End Encryption

Client-Side Encryption:

Server-Side Storage:

7.2 Infrastructure Security

We implement industry-standard security measures:

Data in Transit:

Data at Rest:

Database Security:

Application Security:

7.3 Access Controls

7.4 Incident Response

In the unlikely event of a data breach:

Limited Impact: Due to end-to-end encryption, a server breach would NOT expose file contents (only encrypted blobs and metadata).

8. International Data Transfers

8.1 Data Storage Locations

Primary Data Storage:

Why EU Storage? We chose EU-based infrastructure for strong GDPR protections and privacy-friendly regulatory environment.

8.2 Third-Party Services (Non-EU)

Some Pro tier features rely on services outside the EU:

Solana Blockchain (Global Network):

Solana RPC Providers (Varies by Provider):

8.3 GDPR Transfer Mechanisms

For data transfers outside the EU/EEA, we rely on:

8.4 Your Rights (International Transfers)

You may:

9. Your Privacy Rights (All Users)

Regardless of your location, GeckoShare honors the following privacy rights:

9.1 Right to Know (CCPA)

You have the right to know:

This Privacy Policy serves as our notice of data collection practices.

9.2 Right to Non-Discrimination (CCPA)

We will NOT discriminate against you for exercising privacy rights, including:

9.3 How to Exercise Your Rights

Email Request:

Email privacy@privacygecko.com with:

Web Form:

Submit a formal request via our Data Subject Request Form.

Identity Verification:

Response Time:

10. Cookies and Tracking Technologies

10.1 Cookie Usage

GeckoShare uses minimal cookies for essential functionality:

Cookie Type Purpose Duration Required?
Session Cookies Maintain upload/download state during session Session (deleted when browser closes) Yes (essential)
Wallet Connection Cookie Remember Pro tier wallet connection (Pro users) 7 days Yes (for Pro features)
Rate Limit Cookie Track API request limits to prevent abuse 15 minutes Yes (security)
Analytics Cookies Anonymous usage statistics (if implemented) 1 year No (opt-in)

10.2 Local Storage

Your browser may use Local Storage for:

Control: You can clear Local Storage via browser settings. This will NOT delete files from GeckoShare servers but may interrupt in-progress uploads.

10.3 Third-Party Tracking

GeckoShare does NOT use:

Browser Privacy: We respect Do Not Track (DNT) browser settings and privacy-focused browsers (Brave, Firefox, Tor).

11. Children's Privacy

Age Restriction: GeckoShare is not directed at children under 13 years old. We do not knowingly collect personal information from children under 13.

Parental Notice: If you are a parent or guardian and believe your child under 13 has provided personal information to GeckoShare, please contact us at privacy@privacygecko.com. We will promptly delete such information.

Teen Users (13-18): Users between 13 and 18 years old should have parental or guardian consent before using GeckoShare, especially Pro tier features that involve cryptocurrency.

12. Changes to This Privacy Policy

We may update this Privacy Policy to reflect:

Notification of Changes:

Continued Use = Acceptance: By continuing to use GeckoShare after changes take effect, you accept the updated Privacy Policy.

13. Contact Information and Regulatory Authority

13.1 Contact Us

Privacy Questions:
Email: privacy@privacygecko.com
Subject Line: "Privacy Inquiry"

Data Subject Requests (GDPR/CCPA):
Email: privacy@privacygecko.com
Web Form: Submit GDPR/CCPA Request

Data Protection Officer (if appointed):
Email: dpo@privacygecko.com

General Support:
Email: support@privacygecko.com

13.2 EU Representative (if required by GDPR)

If GeckoShare is established outside the EU/EEA and offers services to EU residents, GDPR Article 27 may require an EU representative.

[TO BE DETERMINED - Consult legal counsel if company is non-EU but serves EU users]

13.3 Supervisory Authority (Right to Lodge Complaint)

Under GDPR Article 77, you have the right to lodge a complaint with a data protection supervisory authority if you believe we have violated your privacy rights.

EU/EEA Users: Contact your country's Data Protection Authority (DPA). Find your DPA: https://edpb.europa.eu/about-edpb/about-edpb/members_en

UK Users: Information Commissioner's Office (ICO)
Website: https://ico.org.uk/
Helpline: 0303 123 1113

California Users: California Attorney General - Privacy Enforcement
Website: https://oag.ca.gov/privacy

We encourage you to contact us first so we can address your concerns directly before escalating to regulators.


GeckoShare's Privacy Commitment: We believe privacy is a fundamental right. Our zero-knowledge architecture ensures that even we cannot access your files. We collect only the minimum data necessary to provide secure, reliable file-sharing services, and we honor your privacy rights under GDPR, CCPA, and global privacy standards.

Thank you for trusting GeckoShare with your files.
Last Updated: October 24, 2025
Return to GeckoShare | Terms of Service | Cookie Policy | Your Privacy Rights